We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Elektronische Vollmachten im österreichischen E-Government
Tauber A., Rössler T.
eGovernment Review, Vol. 4, 2009
Automated Analysis of e-participation Data by utilizing Associative Networks, Spreading Activation and Unsupervised Learning
Teufl P., Payer U., Parycek P.
Electronic Participation
Ausländische Identitäten im österreichischen E-Government
Stranacher K., Tauber A., Rössler T.
Arbeitskonferenz DACH Security
Interoperability: Coupling of e-Delivery Domains
Rössler T., Tauber A.
Proceedings of the 8th International Conference on Ongoing Research, General Development Issues and Projects of Electronic Government (EGOV 09)
Professional Representation in Austrian EGovernment
Tauber A., Rössler T.
Proceedings of the 8th International Conference EGOV 2009
Requirements for Electronic Delivery Systems in E-Government – An Austrian Experience
Tauber A.
Software Services for e-Business and e-Society: Proceedings of the 9th IFIP WG6.1 Conference
The Value of Information Security to European Banking Institutions
Posch R., Georg L., Frefel C., Hämmerli B., Liebenau J., Kärrberg P.
Detecon, 2009
Side-Channel Analysis Attacks and Countermeasures - An Embedded-Software Developers View
Herbst C.
Doctoral Thesis, 2009
Using Templates to Attack Masked Montgomery Ladder Implementations of Modular Exponentiation
Herbst C., Medwed M.
9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers
Numerical solvers and cryptanalysis
Nad T., Lamberger M., Rijmen V.
Journal of Mathematical Cryptology, Vol. 3(3), 2009
Synthesizing Robust Systems
Bloem R., Greimel K., Henzinger T., Jobstmann B.
Proceedings of 9th International Conference on Formal Methods in Computer-Aided Design, FMCAD 2009
Debugging Formal Specifications Using Simple Counterstrategies
Könighofer R., Hofferek G., Bloem R.
Proceedings of 9th International Conference 2009 Formal Methods in Computer Aided Design FMCAD 2009
Media-break resistant eSignatures in eGovernment – an Austrian experience
Leitold H., Posch R., Rössler T.
Emerging Challenges for Security, Privacy, and Trust
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
Mendel F., Rechberger C., Schläffer M., Thomsen S.
Fast Software Encryption. FSE 2009
Rebound Distinguishers: Results on the Full Whirlpool Compression Function
Lamberger M., Mendel F., Rechberger C., Rijmen V., Schläffer M.
Advances in Cryptology - ASIACRYPT 2009
MD5 is Weaker than Weak: Attacks on Concatenated Combiners
Mendel F., Rechberger C., Schläffer M.
Advances in Cryptology - ASIACRYPT 2009
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher
Mendel F., Peyrin T., Rechberger C., Schläffer M.
Selected Areas in Cryptography. SAC 2009
Collision Attack on Boole
Nad T., Mendel F., Schläffer M.
Applied Cryptography and Network Security. ACNS 2009
A Distinguisher for the Compression Function of SIMD-512
Nad T., Mendel F.
Progress in Cryptology - INDOCRYPT 2009
InFeCT - Network Traffic Classification
Payer U., Teufl P.
International Conference on Networking
