We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Impact of Rotations in SHA-1 and Related Hash Functions
Pramstaller N., Rechberger C., Rijmen V.
Selected Areas in Cryptography, International Workshop on Selected Areas in Cryptography, 261-275, (LNCS)
Analysis of simplified variants of SHA-256
Matusiewicz K., Pieprzyk J., Pramstaller N., Rechberger C., Rijmen V.
Western European Workshop on Research in Cryptology - WEWoCR 2005, LNI P-74 (ISSN 1617-5468), Gesellschaft für Informatik , 123-134
Breaking a new Hash Function Design Strategy called SMASH
Pramstaller N., Rechberger C., Rijmen V.
Selected Areas in Cryptography, Springer, (LNCS)
Recent results on SHA-1 and SHA-256
Rechberger C., Rijmen V.
Proceedings of Santa's Crypto Get-together 2005, 51-58
Security Layer on Small Devices
Tauber A.
, Master's Thesis
Formal verification of control software: A case study
Griesmayer A., Bloem R., Hautzendorfer M., Wotawa F.
Innovations in Applied Artificial Intelligence, 18th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, 783-788, (Lecture Notes in Computer Science ; vol. 3533)
Giving an Interoperable Solution for Incorporating Foreign eIDs in Austrian E-Government",
Roessler T., Posch R., Hayat A.
Proceedings of IDABC-Conference 2005, Cross-Border e-Government Services for Administrations, Businesses and Citizens
Exploiting Coding Theory for Collision Attacks on SHA-1
Pramstaller N., Rechberger C., Rijmen V.
Cryptography and Coding. Cryptography and Coding 2005, 10th IMA International Conference Cryptography and Coding, 78-95, (Lecture Notes in Computer Science; vol. 3796)
SCARD D1.2 Requirement Specification Report
Aigner M., Mangard S., Popp T.
A Masked AES ASIC Implementation
Pramstaller N., Oswald M., Mangard S., Gürkaynak F., Häne S.
Proceedings of Austrochip 2004, Austrochip 2004, 77-81
Hardware Countermeasures Against DPA – A Statistical Analysis of Their Effectiveness
Mangard S.
Topics in Cryptology - CT-RSA 2004, Cryptographers´ Track at the RSA Conference, 222-235, (Lecture Notes in Computer Science)
The Austrian Citizen Card: A Bottom-Up View
Leitold H., Posch K.
Security and Privacy in Advanced Networking Technologies, IOS Press, 231-236
Technische Aspekte des E-Voting
Leitold H.
Journal für Rechtspolitik, Vol. 12(2), 77-84
What to Expect from Biometrics
Leitold H., Posch R.
Proceedings of BSI Biometrieworkshop, BSI Biometrieworkshop
Identification in cross-border e-Government
Leitold H., Posch R., Roessler T.
European Conference on E-Government, European Conference on E-Government, 481-491
Security of IEEE 802.11 considering Power and EM Side-Channel Information
Rechberger C., Oswald M.
International Conference on Computing, Communications and Control Technologies (CCCT 2004), 129-133
Stream Ciphers and Side-Channel Analysis
Rechberger C., Oswald M.
SASC - The State of the Art of Stream Ciphers, 320-326
Practical Template Attacks
Rechberger C., Oswald M.
Information Security Applications, WISA - Workshop on Information Security Applications, 440-456, (Lecture Notes in Computer Science)
A Highly Regular and Scalable AES Hardware Architecture
Mangard S., Aigner M., Dominikus S.
IEEE Transactions on Computers, Vol. 52(4), 483-491