We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Interactive presentation: Automatic hardware synthesis from specifications: a case study
Bloem R., Galler S., Jobstmann B., Piterman N., Pnueli A., Weiglhofer M.
Proceedings of the conference on Design, automation and test in Europe, 10th Conference on Design, Automation and Test in Europe, 1188-1193
RAT: A Tool for the Formal Analysis of Requirements
Bloem R., Cavada R., Pill I., Roveri M., Tchaltsev A.
19th International Conference, CAV 2007, Berlin, Germany, July 3-7, 2007. Proceedings, International Conference on Computer Aided Verification, 263-267, (Lecture Notes in Computer Science)
Fault localization and correction with QBF
Staber S., Bloem R.
Theory and Applications of Satisfiability Testing – SAT 2007, International Conference on Theory and Applications of Satisfiability Testing, 355-268, (Lecture notes in computer science)
Attacking DPA-Resistant Logic Styles in Practice
Zefferer T.
, Master's Thesis
Die TU Graz als Leuchtturm für Netzwerk- und Informationssicherheit
Leitold H., Posch R.
, (Forschungsjournal der Technischen Universität Graz)
Current Status of SHA-1
Mendel F., Pramstaller N., Rechberger C., Rijmen V.
Collisions for 70-step SHA-1: On the Full Cost of Collision Search
De Cannière C., Mendel F., Rechberger C.
Selected Areas in Cryptography, 14th International Workshop on Selected Areas in Cryptography, 56-73, (Lecture Notes in Computer Science; vol. 4876)
The Grindahl hash functions
Knudsen L., Rechberger C., Thomsen S.
Fast Software Encryption (FSE) 2007, Fast Software Encryption Workshop, 39-57, (LNCS)
On Authentication With HMAC and Non-Rondom Properties
Rechberger C., Rijmen V.
Financial Cryptography 2007, International Conference on Financial Cryptography and Data Security, 119-113, (LNCS)
The SHA Family of Hash Functions: Recent Results
Rechberger C., Rijmen V.
Proceedings of Security and Protection of Information 2007, Security and Protection of Information Conference, 107-114
Second Preimages for SMASH
Lamberger M., Pramstaller N., Rechberger C., Rijmen V.
Cryptographers´ Track at the RSA Conference, The Cryptographers' Track at the RSA Conference 2007, 101-111, (LNCS)
Strategische Technologien für das E-Government
Posch R.
Menschenrechte in der Informationsgesellschaft, Boorberg, 233-256, (Recht und neue Medien)
Zukunftsperspektive Sichere Verwaltung
Posch R.
Verwaltung im Umbruch, Neuer Wissenschaftlicher Verlag GmbH Nfg KG, 91-100
Trust, Security and Identify Managament: The Austrian Viewpoint
Posch R.
Conference on Trust and Identity Management, 12-21
Eine 8-bit Highspeed Softwareimplementierung von Whirlpool
Könighofer R., Berger S., Herbst C.
DACH Security 2007, Arbeitskonferenz DACH Security, 459-470, (IT security & IT management)
Energy Evaluation of Software Implementations of Block Ciphers under Memory Constraints
Großschädl J., Tillich S., Rechberger C., Hofmann M., Medwed M.
Proceedings of the 10th Conference on Design, Automation and Test in Europe (DATE 2007), 10th Conference on Design, Automation and Test in Europe, 1110-1115
Implementation Aspects of the DPA-Resistant Logic Style MDPL
Popp T., Mangard S.
IEEE International Symposium on Circuits and Systems, IEEE International Symposium on Circuits and Systems, 2913-2916
Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers
Oswald M., Mangard S., Herbst C., Tillich S.
Topics in Cryptology - CT-RSA 2006, Cryptographers´ Track at the RSA Conference, 192-207, (Lecture Notes in Computer Science)
An AES Smart Card Implementation resitant to Power Analysis Attacks
Herbst C., Oswald M., Mangard S.
Applied cryptography and Network security, 4th International Conference on Applied Cryptography and Network Security, 239-252, (Lecture Notes in Computer Science)
Pinpointing the Side-Channel Leakage of Masked CMOS Implementations
Mangard S., Schramm K.
Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop on Cryptographic Hardware and Embedded Systems, 76-90, (Lecture Notes in Computer Science)