We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
InFeCT - Network Traffic Classification
Payer U., Teufl P.
International Conference on Networking, International Conference on Networking, ...-...
Formal Analysis of a TPM-Based Secrets Distribution and Storage Scheme
Tögl R., Hofferek G., Greimel K., Leung A., Phan R., Bloem R.
International Symposium on Trusted Computing (TrustCom 2008) Proceedings, in 9th ICYCS Conference Proceedings, International Symposium on Trusted Computing, 2289-2294
Debugging Design Errors by Using Unsatisfiable Cores
Suelflow A., Fey G., Bloem R., Drechsler R.
Methoden und Beschreibungssprachen zur Modellierung und Verifikation von Schaltungen und Systemen, Workshop Methoden und Beschreibungssprachen zur Modellierung und Verifikation von Schaltungen und Systemen, 159-168
Analysis of the Hash Function Design Strategy called SMASH
Lamberger M., Pramstaller N., Rechberger C., Rijmen V.
IEEE Transactions on Information Theory, Vol. 54(8), 3647-3655
New Results on NMAC/HMAC when Instantiated with Popular Hash Functions
Rechberger C., Rijmen V.
Journal of Universal Computer Science , Vol. 14(3), 347-376
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba
Aumasson J., Fischer S., Khazaei S., Meier W., Rechberger C.
Fast Software Encryption Workshop, Springer, 470-488
Searching for messages conforming to arbitrary sets of conditions in SHA-256
Hölbl M., Rechberger C., Welzer T.
Proceedings of Western European Workshop on Research in Cryptology, Western European Workshop on Research in Cryptology, 28-38, (Lecture notes in computer science)
A Practical Fault Attack on Square and Multiply
Schmidt J., Herbst C.
5th Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2008, Fault Diagnosis and Tolerance in Cryptography, 53-58
Automatic Fault Localization for Property Checking
Fey G., Staber S., Bloem R., Drechsler R.
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Vol. 27(6), 1138-1149
Open Implication
Greimel K., Bloem R., Jobstmann B., Vardi M.
Automata, Languages and Programming - ICALP 2008, 2008 International Colloquium on Automata, Languages and Programming, 361-372, (Lecture Notes in Computer Science; vol. 5126)
Using unsatisfiable cores to debug multiple design errors
Suelflow A., Fey G., Bloem R., Drechsler R.
GLSVLSI '08: Proceedings of the 18th ACM Great Lakes symposium on VLSI, 18th ACM Great Lakes Symposium on VLSI, 77-82
A (Second) Preimage Attack on the GOST Hash Function
Mendel F., Pramstaller N., Rechberger C.
Fast Software Encryption. FSE 2008, 2008 Fast Software Encryption Workshop, 224-234, (Lecture Notes in Computer Science; vol. 5086)
Correlated keystreams in Moustique
Käsper E., Rijmen V., Bjørstad T., Rechberger C., Robshaw M., Sekar G.
Progress in Cryptology – AFRICACRYPT 2008, 1st International Conference on Cryptology in Africa, 246-257, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5023 LNCS)
Collisions and other Non-Random Properties for Step-Reduced SHA-256
Indesteege S., Mendel F., Preneel B., Rechberger C.
Selected Areas in Cryptography, 15th Annual Workshop on Selected Areas in Cryptography, 276-293, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5381 LNCS)
Preimages for Reduced SHA-0 and SHA-1
De Cannière C., Rechberger C.
Advances in Cryptology - Proceedings CRYPTO 2008, 28th Annual International Cryptology Conference, 179-202, (Lecture Notes in Computer Science; vol. 5157)
Cryptanalysis of the GOST Hash Function
Mendel F., Pramstaller N., Rechberger C., Kontak M., Szmidt J.
Advances in Cryptology - Proceedings CRYPTO 2008, 28th Annual International Cryptology Conference, 162-178, (Lecture Notes in Computer Science; vol. 5157)
Boosting AES Performance on a Tiny Processor Core
Tillich S., Herbst C.
Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, 170-186, (Lecture Notes in Computer Science; vol. 4964)
Attacking State-of-the-Art Software Countermeasures—A Case Study for AES
Tillich S., Herbst C.
Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop Cryptographic Hardware and Embedded Systems, 228-243, (Lecture Notes in Computer Science; vol. 5154)