We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Identification in E-Government: An Overview of Approaches
Leitold H., Posch R.
Encyclopedia of Digital Government, IDEA Group, 984-987, 2006
Communications and Multimedia Security
Leitold H., Markatos E.
Springer Berlin / Heidelberg, 2006
D.VAM11 -- Suggested Algorithms for Light-Weight Cryptography
Aigner M., Dominikus S., Feldhofer M., Rechberger C., Oswald M.
2006
The NIST Cryptographic Workshop on Hash Functions
Rechberger C., Rijmen V., Sklavos N.
IEEE Security & Privacy, Vol. 4(1), 2006
Finding SHA-1 Characteristics: General Results and Applications
De Cannière C., Rechberger C.
Advances in Cryptology - Asiacrypt 2006
Threshold Implementations Against Side-Channel Attacks and Glitches
Nikova S., Rechberger C., Rijmen V.
Information and Communications Security
A Compact FPGA Implementation of the Hash Function Whirlpool
Pramstaller N., Rechberger C., Rijmen V.
Fourteenth ACM/SIGDA International Symposium on Field-Programmable Gate Arrays
The Impact of Carries on the Complexity of Collision Attacks on SHA-1
Mendel F., Pramstaller N., Rechberger C., Rijmen V.
Fast Software Encryption. FSE 2006
A Case Against Currently Used Hash Functions in RFID Protocols
Feldhofer M., Rechberger C.
On the Move to Meaningful Internet Systems 2006
A Case Against Currently Used Hash Functions in RFID Protocols
Feldhofer M., Rechberger C.
Workshop on RFID Security 2006
On the Collision Resistance of RIPEMD-160
Mendel F., Pramstaller N., Rechberger C., Rijmen V.
Information Security. ISC 2006
Improved Collision-Attack on the Hash Function Proposed at PKC'98
Mendel F., Pramstaller N., Rechberger C.
Information Security and Cryptology – ICISC 2006
Analysis of Step-Reduced SHA-256
Mendel F., Pramstaller N., Rechberger C., Rijmen V.
Fast Software Encryption. FSE 2006
Verfahren und Schaltung zur Durchführung von Rechenoperationen
Popp T., Mangard S., Aigner M.
SCARD D7.1 Specification SCARD Chip
Roth M., Tillich S., Aigner M., Popp T., Mangard S.
2005
SCARD D2.3 DPA Proof Logic Styles - Technical Report
Popp T., Mangard S., Aigner M.
2005
SCARD D6.1 Final Report Modeling & Simulation of SCA Effects
Trifiletti A., Popp T., Aigner M., Mangard S., Batina L.
2005
SCARD D2.4 Final Report Logic & Cell Library Development
Aigner M., Popp T., Mangard S.
2005
Side-Channel Leakage of Masked CMOS Gates
Mangard S., Popp T., Gammel B.
Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings
Successfully Attacking Masked AES Hardware Implementations
Mangard S., Pramstaller N., Oswald M.
Cryptographic Hardware and Embedded Systems - CHES 2005
