We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Improved Collision-Attack on the Hash Function Proposed at PKC'98
Mendel F., Pramstaller N., Rechberger C.
Information Security and Cryptology – ICISC 2006
Analysis of Step-Reduced SHA-256
Mendel F., Pramstaller N., Rechberger C., Rijmen V.
Fast Software Encryption. FSE 2006
Verfahren und Schaltung zur Durchführung von Rechenoperationen
Popp T., Mangard S., Aigner M.
SCARD D7.1 Specification SCARD Chip
Roth M., Tillich S., Aigner M., Popp T., Mangard S.
2005
SCARD D2.3 DPA Proof Logic Styles - Technical Report
Popp T., Mangard S., Aigner M.
2005
SCARD D6.1 Final Report Modeling & Simulation of SCA Effects
Trifiletti A., Popp T., Aigner M., Mangard S., Batina L.
2005
SCARD D2.4 Final Report Logic & Cell Library Development
Aigner M., Popp T., Mangard S.
2005
Side-Channel Leakage of Masked CMOS Gates
Mangard S., Popp T., Gammel B.
Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings
Successfully Attacking Masked AES Hardware Implementations
Mangard S., Pramstaller N., Oswald M.
Cryptographic Hardware and Embedded Systems - CHES 2005
A Side-Channel Analysis Resistant Description of the AES S-box
Oswald M., Mangard S., Pramstaller N., Rijmen V.
Fast Software Encryption
Efficient AES Implementations on ASICs and FPGAs
Pramstaller N., Mangard S., Dominikus S., Wolkerstorfer J.
Proceedings of Fourth Conference on the Advanced Encryption Standard AES4
Masked Dual-Rail Pre-Charge Logic: DPA-Resistance without Routing Constraints
Popp T., Mangard S.
Cryptographic Hardware and Embedded Systems - CHES 2005
Traffic Classification using Self-Organizing Maps
Payer U., Lamberger M., Teufl P.
Proceedings of the Fifth International Network Conference, INC 2005 Fifth International Networking Conference Workshops
Massive Data Mining for Polymorphic Code Detection
Payer U., Teufl P., Kraxberger S., Lamberger M.
Computer Network Security
Hybrid Engine for Polymorphic Code Detection
Payer U., Teufl P., Lamberger M.
Detection of intrusions and malware, and vulnerability assessment
Formal verification of control software: A case study
Griesmayer A., Bloem R., Hautzendorfer M., Wotawa F.
Innovations in Applied Artificial Intelligence
Diagnosis is Repair
Staber S., Jobstmann B., Bloem R.
16th International Workshop on Principles of Diagnosis
Program Repair as a Game
Jobstmann B., Griesmayer A., Bloem R.
Computer Aided Verification
Repair of boolean programs using games
Griesmayer A., Bloem R.
Games in Design and Verification
Finding and Fixing Faults
Staber S., Jobstmann B., Bloem R.
Correct Hardware Design and Verification Methods
