We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Fault localization and correction with QBF
Staber S., Bloem R.
Theory and Applications of Satisfiability Testing – SAT 2007
Attacking DPA-Resistant Logic Styles in Practice
Zefferer T.
Master's Thesis, 2007
Current Status of SHA-1
Mendel F., Pramstaller N., Rechberger C., Rijmen V.
2007
Collisions for 70-step SHA-1: On the Full Cost of Collision Search
De Cannière C., Mendel F., Rechberger C.
Selected Areas in Cryptography
The Grindahl hash functions
Knudsen L., Rechberger C., Thomsen S.
Fast Software Encryption (FSE) 2007
On Authentication With HMAC and Non-Rondom Properties
Rechberger C., Rijmen V.
Financial Cryptography 2007
The SHA Family of Hash Functions: Recent Results
Rechberger C., Rijmen V.
Proceedings of Security and Protection of Information 2007
Second Preimages for SMASH
Lamberger M., Pramstaller N., Rechberger C., Rijmen V.
Cryptographers´ Track at the RSA Conference
Strategische Technologien für das E-Government
Posch R.
Menschenrechte in der Informationsgesellschaft, Boorberg, 233-256, 2007
Zukunftsperspektive Sichere Verwaltung
Posch R.
Verwaltung im Umbruch, Neuer Wissenschaftlicher Verlag GmbH Nfg KG, 91-100, 2007
Trust, Security and Identify Managament: The Austrian Viewpoint
Posch R.
Conference on Trust and Identity Management
Eine 8-bit Highspeed Softwareimplementierung von Whirlpool
Könighofer R., Berger S., Herbst C.
DACH Security 2007
Energy Evaluation of Software Implementations of Block Ciphers under Memory Constraints
Großschädl J., Tillich S., Rechberger C., Hofmann M., Medwed M.
Proceedings of the 10th Conference on Design, Automation and Test in Europe (DATE 2007)
Implementation Aspects of the DPA-Resistant Logic Style MDPL
Popp T., Mangard S.
IEEE International Symposium on Circuits and Systems
Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers
Oswald M., Mangard S., Herbst C., Tillich S.
Topics in Cryptology - CT-RSA 2006
An AES Smart Card Implementation resitant to Power Analysis Attacks
Herbst C., Oswald M., Mangard S.
Applied cryptography and Network security
Pinpointing the Side-Channel Leakage of Masked CMOS Implementations
Mangard S., Schramm K.
Cryptographic Hardware and Embedded Systems - CHES 2006
Side Channel Analysis Resistant Design Flow
Aigner M., Popp T., Mangard S., Trifiletti A., Menicocci R., Olivieri M., Scotti G.
IEEE International Symposium on Circuits and Systems
WiFi Chipset Fingerprinting
Lackner G., Lamberger M., Teufl P., Payer U.
D-A-CH mobility 2006
