We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Repair of boolean programs using games
Griesmayer A., Bloem R.
Games in Design and Verification, Games in Design and Verification, ?-?
Finding and Fixing Faults
Staber S., Jobstmann B., Bloem R.
Correct Hardware Design and Verification Methods, Advanced Research Working Conference on Correct Hardware Design and Verification Methods, 35-49, (Lecture notes in computer science)
Identifikationsmodell der österreichischen Bürgerkarte
Leitold H., Roessler T.
D-A-CH, D-A-CH Security Conference, 121-129
Identifying Obstacles in moving towards an Interoperable Electronic Identity Management System
Leitold H., Posch R., Hayat A.
Proceedings of eGOV INTEROP'05, International Conference on Interoperability of eGovernment Services
C(I)IP Aktivitäten in Österreich
Leitold H., Posch R.
Preprints of CIP Europe 2005, CIP Europe 2005, 50-60
E-Voting: A Scalable Approach using XML and Hardware Security Modules
Leitold H., Posch R., Roessler T.
Proceedings of eee2005, IEEE International Conference on e-Technology, e-Commerce and e-Service 2005 (eee2005), 480-485
Interoperable Certification Authorities in the European Union - A Practical Solution
Hayat A., Rechberger C.
EGOV05 - International Conference on E-Government, 374-381
Impact of Rotations in SHA-1 and Related Hash Functions
Pramstaller N., Rechberger C., Rijmen V.
Selected Areas in Cryptography, International Workshop on Selected Areas in Cryptography, 261-275, (LNCS)
Analysis of simplified variants of SHA-256
Matusiewicz K., Pieprzyk J., Pramstaller N., Rechberger C., Rijmen V.
Western European Workshop on Research in Cryptology - WEWoCR 2005, LNI P-74 (ISSN 1617-5468), Gesellschaft für Informatik , 123-134
Breaking a new Hash Function Design Strategy called SMASH
Pramstaller N., Rechberger C., Rijmen V.
Selected Areas in Cryptography, Springer, (LNCS)
Recent results on SHA-1 and SHA-256
Rechberger C., Rijmen V.
Proceedings of Santa's Crypto Get-together 2005, 51-58
Security Layer on Small Devices
Tauber A.
, Master's Thesis
Formal verification of control software: A case study
Griesmayer A., Bloem R., Hautzendorfer M., Wotawa F.
Innovations in Applied Artificial Intelligence, 18th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, 783-788, (Lecture Notes in Computer Science ; vol. 3533)
Giving an Interoperable Solution for Incorporating Foreign eIDs in Austrian E-Government",
Roessler T., Posch R., Hayat A.
Proceedings of IDABC-Conference 2005, Cross-Border e-Government Services for Administrations, Businesses and Citizens
Exploiting Coding Theory for Collision Attacks on SHA-1
Pramstaller N., Rechberger C., Rijmen V.
Cryptography and Coding. Cryptography and Coding 2005, 10th IMA International Conference Cryptography and Coding, 78-95, (Lecture Notes in Computer Science; vol. 3796)
SCARD D1.2 Requirement Specification Report
Aigner M., Mangard S., Popp T.
A Masked AES ASIC Implementation
Pramstaller N., Oswald M., Mangard S., Gürkaynak F., Häne S.
Proceedings of Austrochip 2004, Austrochip 2004, 77-81
Hardware Countermeasures Against DPA – A Statistical Analysis of Their Effectiveness
Mangard S.
Topics in Cryptology - CT-RSA 2004, Cryptographers´ Track at the RSA Conference, 222-235, (Lecture Notes in Computer Science)
The Austrian Citizen Card: A Bottom-Up View
Leitold H., Posch K.
Security and Privacy in Advanced Networking Technologies, IOS Press, 231-236