We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Synthesizing Robust Systems
Bloem R., Greimel K., Henzinger T., Jobstmann B.
Proceedings of 9th International Conference on Formal Methods in Computer-Aided Design, FMCAD 2009
Using Templates to Attack Masked Montgomery Ladder Implementations of Modular Exponentiation
Herbst C., Medwed M.
9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers
Debugging Formal Specifications Using Simple Counterstrategies
Könighofer R., Hofferek G., Bloem R.
Proceedings of 9th International Conference 2009 Formal Methods in Computer Aided Design FMCAD 2009
Media-break resistant eSignatures in eGovernment – an Austrian experience
Leitold H., Posch R., Rössler T.
Emerging Challenges for Security, Privacy, and Trust
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
Mendel F., Rechberger C., Schläffer M., Thomsen S.
Fast Software Encryption. FSE 2009
Rebound Distinguishers: Results on the Full Whirlpool Compression Function
Lamberger M., Mendel F., Rechberger C., Rijmen V., Schläffer M.
Advances in Cryptology - ASIACRYPT 2009
MD5 is Weaker than Weak: Attacks on Concatenated Combiners
Mendel F., Rechberger C., Schläffer M.
Advances in Cryptology - ASIACRYPT 2009
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher
Mendel F., Peyrin T., Rechberger C., Schläffer M.
Selected Areas in Cryptography. SAC 2009
InFeCT - Network Traffic Classification
Payer U., Teufl P.
International Conference on Networking
Formal Analysis of a TPM-Based Secrets Distribution and Storage Scheme
Tögl R., Hofferek G., Greimel K., Leung A., Phan R., Bloem R.
International Symposium on Trusted Computing (TrustCom 2008) Proceedings, in 9th ICYCS Conference Proceedings
Debugging Design Errors by Using Unsatisfiable Cores
Suelflow A., Fey G., Bloem R., Drechsler R.
Methoden und Beschreibungssprachen zur Modellierung und Verifikation von Schaltungen und Systemen
Analysis of the Hash Function Design Strategy called SMASH
Lamberger M., Pramstaller N., Rechberger C., Rijmen V.
IEEE Transactions on Information Theory, Vol. 54(8), 2008
New Results on NMAC/HMAC when Instantiated with Popular Hash Functions
Rechberger C., Rijmen V.
Journal of Universal Computer Science , Vol. 14(3), 2008
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba
Aumasson J., Fischer S., Khazaei S., Meier W., Rechberger C.
Fast Software Encryption Workshop
Searching for messages conforming to arbitrary sets of conditions in SHA-256
Hölbl M., Rechberger C., Welzer T.
Proceedings of Western European Workshop on Research in Cryptology
Automatic Fault Localization for Property Checking
Fey G., Staber S., Bloem R., Drechsler R.
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Vol. 27(6), 2008
A Practical Fault Attack on Square and Multiply
Schmidt J., Herbst C.
5th Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2008
Open Implication
Greimel K., Bloem R., Jobstmann B., Vardi M.
Automata, Languages and Programming - ICALP 2008
