We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Identifikationsmodell der österreichischen Bürgerkarte
Leitold H., Roessler T.
D-A-CH
Identifying Obstacles in moving towards an Interoperable Electronic Identity Management System
Leitold H., Posch R., Hayat A.
Proceedings of eGOV INTEROP'05
C(I)IP Aktivitäten in Österreich
Leitold H., Posch R.
Preprints of CIP Europe 2005
E-Voting: A Scalable Approach using XML and Hardware Security Modules
Leitold H., Posch R., Roessler T.
Proceedings of eee2005
Interoperable Certification Authorities in the European Union - A Practical Solution
Hayat A., Rechberger C.
EGOV05 - International Conference on E-Government
Impact of Rotations in SHA-1 and Related Hash Functions
Pramstaller N., Rechberger C., Rijmen V.
Selected Areas in Cryptography
Analysis of simplified variants of SHA-256
Matusiewicz K., Pieprzyk J., Pramstaller N., Rechberger C., Rijmen V.
Western European Workshop on Research in Cryptology - WEWoCR 2005, LNI P-74 (ISSN 1617-5468)
Breaking a new Hash Function Design Strategy called SMASH
Pramstaller N., Rechberger C., Rijmen V.
Selected Areas in Cryptography
Recent results on SHA-1 and SHA-256
Rechberger C., Rijmen V.
Proceedings of Santa's Crypto Get-together 2005
Security Layer on Small Devices
Tauber A.
Master's Thesis, 2005
Giving an Interoperable Solution for Incorporating Foreign eIDs in Austrian E-Government",
Roessler T., Posch R., Hayat A.
Proceedings of IDABC-Conference 2005
Exploiting Coding Theory for Collision Attacks on SHA-1
Pramstaller N., Rechberger C., Rijmen V.
Cryptography and Coding. Cryptography and Coding 2005
SCARD D1.2 Requirement Specification Report
Aigner M., Mangard S., Popp T.
2004
Securing Implementations of Block Ciphers against Side-Channel Attacks
Mangard S.
Doctoral Thesis, 2004
A Masked AES ASIC Implementation
Pramstaller N., Oswald M., Mangard S., Gürkaynak F., Häne S.
Proceedings of Austrochip 2004
Hardware Countermeasures Against DPA – A Statistical Analysis of Their Effectiveness
Mangard S.
Topics in Cryptology - CT-RSA 2004
The Austrian Citizen Card: A Bottom-Up View
Leitold H., Posch K.
Security and Privacy in Advanced Networking Technologies, IOS Press, 231-236, 2004
Technische Aspekte des E-Voting
Leitold H.
Journal für Rechtspolitik, Vol. 12(2), 2004
What to Expect from Biometrics
Leitold H., Posch R.
Proceedings of BSI Biometrieworkshop
Identification in cross-border e-Government
Leitold H., Posch R., Roessler T.
European Conference on E-Government
