We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Searching for messages conforming to arbitrary sets of conditions in SHA-256
Hölbl M., Rechberger C., Welzer T.
Proceedings of Western European Workshop on Research in Cryptology, Western European Workshop on Research in Cryptology, 28-38, (Lecture notes in computer science)
Automatic Fault Localization for Property Checking
Fey G., Staber S., Bloem R., Drechsler R.
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Vol. 27(6), 1138-1149
Open Implication
Greimel K., Bloem R., Jobstmann B., Vardi M.
Automata, Languages and Programming - ICALP 2008, 2008 International Colloquium on Automata, Languages and Programming, 361-372, (Lecture Notes in Computer Science; vol. 5126)
Using unsatisfiable cores to debug multiple design errors
Suelflow A., Fey G., Bloem R., Drechsler R.
GLSVLSI '08: Proceedings of the 18th ACM Great Lakes symposium on VLSI, 18th ACM Great Lakes Symposium on VLSI, 77-82
A Practical Fault Attack on Square and Multiply
Schmidt J., Herbst C.
5th Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2008, Fault Diagnosis and Tolerance in Cryptography, 53-58
A (Second) Preimage Attack on the GOST Hash Function
Mendel F., Pramstaller N., Rechberger C.
Fast Software Encryption. FSE 2008, 2008 Fast Software Encryption Workshop, 224-234, (Lecture Notes in Computer Science; vol. 5086)
Correlated keystreams in Moustique
Käsper E., Rijmen V., Bjørstad T., Rechberger C., Robshaw M., Sekar G.
Progress in Cryptology – AFRICACRYPT 2008, 1st International Conference on Cryptology in Africa, 246-257, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5023 LNCS)
Collisions and other Non-Random Properties for Step-Reduced SHA-256
Indesteege S., Mendel F., Preneel B., Rechberger C.
Selected Areas in Cryptography, 15th Annual Workshop on Selected Areas in Cryptography, 276-293, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5381 LNCS)
Preimages for Reduced SHA-0 and SHA-1
De Cannière C., Rechberger C.
Advances in Cryptology - Proceedings CRYPTO 2008, 28th Annual International Cryptology Conference, 179-202, (Lecture Notes in Computer Science; vol. 5157)
Cryptanalysis of the GOST Hash Function
Mendel F., Pramstaller N., Rechberger C., Kontak M., Szmidt J.
Advances in Cryptology - Proceedings CRYPTO 2008, 28th Annual International Cryptology Conference, 162-178, (Lecture Notes in Computer Science; vol. 5157)
Boosting AES Performance on a Tiny Processor Core
Tillich S., Herbst C.
Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, 170-186, (Lecture Notes in Computer Science; vol. 4964)
Attacking State-of-the-Art Software Countermeasures—A Case Study for AES
Tillich S., Herbst C.
Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop Cryptographic Hardware and Embedded Systems, 228-243, (Lecture Notes in Computer Science; vol. 5154)
Enhancing Side-Channel Analysis with Low-Cost Shielding Techniques
Plos T., Hutter M., Herbst C.
Tagungsband, Austrochip 2008, Linz, Austria, October 8, 2008, Proceedings, Austrochip 2008, 90-95
Power Analysis Attacks - Revealing the Secrets of Smart Cards
Mangard S., Oswald M., Popp T.
, Springer
Power Analysis Attacks and Countermeasures
Popp T., Mangard S., Oswald M.
IEEE design & test of computers, Vol. 24(6), 535-543
Power and EM Attacks on Passive 13.56 MHz RFID Devices
Hutter M., Mangard S., Feldhofer M.
Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings, 9th International Workshop Cryptographic Hardware and Embedded Systems , 320-330, (Lecture Notes in Computer Science (LNCS))
Protecting AES Software Implementations on 32-bit Processors against Power Analysis
Tillich S., Herbst C., Mangard S.
Applied Cryptography and Network Security, 5th International Conference on Applied Cryptography and Network Security, 141-157, (Lecture Notes in Computer Science; vol. 4521)
Template Attacks on Masking - Resistance Is Futile
Oswald E., Mangard S.
Cryptographers´ Track at the RSA Conference, 243-256
Evaluation of the Masked Logic Style MDPL on a Prototype Chip
Popp T., Kirschbaum M., Zefferer T., Mangard S.
Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop Cryptographic Hardware and Embedded Systems , 81-94, (Lecture Notes in Computer Science (LNCS))
Symbolic Implementation of Alternating Automata
Bloem R., Cimatti A., Pill I., Roveri M.
International journal of foundations of computer science, Vol. 18(4), 727-743