We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Preimages for Reduced SHA-0 and SHA-1
De Cannière C., Rechberger C.
Advances in Cryptology - Proceedings CRYPTO 2008, 28th Annual International Cryptology Conference, 179-202, (Lecture Notes in Computer Science; vol. 5157)
Cryptanalysis of the GOST Hash Function
Mendel F., Pramstaller N., Rechberger C., Kontak M., Szmidt J.
Advances in Cryptology - Proceedings CRYPTO 2008, 28th Annual International Cryptology Conference, 162-178, (Lecture Notes in Computer Science; vol. 5157)
Boosting AES Performance on a Tiny Processor Core
Tillich S., Herbst C.
Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, 170-186, (Lecture Notes in Computer Science; vol. 4964)
Attacking State-of-the-Art Software Countermeasures—A Case Study for AES
Tillich S., Herbst C.
Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop Cryptographic Hardware and Embedded Systems, 228-243, (Lecture Notes in Computer Science; vol. 5154)
Enhancing Side-Channel Analysis with Low-Cost Shielding Techniques
Plos T., Hutter M., Herbst C.
Tagungsband, Austrochip 2008, Linz, Austria, October 8, 2008, Proceedings, Austrochip 2008, 90-95
Power Analysis Attacks - Revealing the Secrets of Smart Cards
Mangard S., Oswald M., Popp T.
, Springer
Power Analysis Attacks and Countermeasures
Popp T., Mangard S., Oswald M.
IEEE design & test of computers, Vol. 24(6), 535-543
Protecting AES Software Implementations on 32-bit Processors against Power Analysis
Tillich S., Herbst C., Mangard S.
Applied Cryptography and Network Security, 5th International Conference on Applied Cryptography and Network Security, 141-157, (Lecture Notes in Computer Science; vol. 4521)
Power and EM Attacks on Passive 13.56 MHz RFID Devices
Hutter M., Mangard S., Feldhofer M.
Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings, 9th International Workshop Cryptographic Hardware and Embedded Systems , 320-330, (Lecture Notes in Computer Science (LNCS))
Template Attacks on Masking - Resistance Is Futile
Oswald E., Mangard S.
Cryptographers´ Track at the RSA Conference, 243-256
Evaluation of the Masked Logic Style MDPL on a Prototype Chip
Popp T., Kirschbaum M., Zefferer T., Mangard S.
Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop Cryptographic Hardware and Embedded Systems , 81-94, (Lecture Notes in Computer Science (LNCS))
Symbolic Implementation of Alternating Automata
Bloem R., Cimatti A., Pill I., Roveri M.
International journal of foundations of computer science, Vol. 18(4), 727-743
Specify, Compile, Run: Hardware from PSL
Bloem R., Galler S., Jobstmann B., Piterman N., Pnueli A., Weiglhofer M.
6th International Workshop on Compiler Optimization Meets Compiler Verification, 6-20
Anzu: A Tool for Property Synthesis
Jobstmann B., Galler S., Weiglhofer M., Bloem R.
Proceedings of the 19th International Conference of Computer Aided Verification 2007, 258-262
Interactive presentation: Automatic hardware synthesis from specifications: a case study
Bloem R., Galler S., Jobstmann B., Piterman N., Pnueli A., Weiglhofer M.
Proceedings of the conference on Design, automation and test in Europe, 10th Conference on Design, Automation and Test in Europe, 1188-1193
RAT: A Tool for the Formal Analysis of Requirements
Bloem R., Cavada R., Pill I., Roveri M., Tchaltsev A.
19th International Conference, CAV 2007, Berlin, Germany, July 3-7, 2007. Proceedings, International Conference on Computer Aided Verification, 263-267, (Lecture Notes in Computer Science)
Fault localization and correction with QBF
Staber S., Bloem R.
Theory and Applications of Satisfiability Testing – SAT 2007, International Conference on Theory and Applications of Satisfiability Testing, 355-268, (Lecture notes in computer science)
Attacking DPA-Resistant Logic Styles in Practice
Zefferer T.
, Master's Thesis
Die TU Graz als Leuchtturm für Netzwerk- und Informationssicherheit
Leitold H., Posch R.
, (Forschungsjournal der Technischen Universität Graz)
Current Status of SHA-1
Mendel F., Pramstaller N., Rechberger C., Rijmen V.