We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Exploiting Radiated Emissions - EM Attacks on Cryptographic ICs
Mangard S.
Proceedings of Austrochip 2003, Austrochip 2003, 13-16
A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion
Mangard S.
Information Security and Cryptology - ICISC 2002: 5th International Conference, Seoul, Korea, November 28-29, 2002. Revised Papers, International Conference on Information Security and Cryptology, 343-358, (Lecture Notes in Computer Science)
Recent trends in computer-aided verification
Bloem R.
CoLogNET Newsletter, Vol. 5, 1-2
Austrian e-Government and Citizen Card Initiatives
Leitold H., Posch R.
Proceedings of the 2nd NATO scientific conference on Security and Protection of Information, 7-14
Verification and Fault Localization for VHDL Programs
Bloem R., Wotawa F.
Telematik, Vol. 8(2), 30-33
Analysis of symbolic SCC hull algorithms
Bloem R., Somenzi F., Ravi K.
International Conference on Formal Methods in Computer-Aided Design, International Conference on Formal Methods in Computer-Aided Design, 88-105
Fair simulation minimization
Bloem R., Gurumurthy S., Somenzi F.
International Conference on Computer Aided Verification, Springer, 610-623
Identification and Confidentiality for e-Government
Leitold H., Posch R.
Certification and Security in E-Services: From E-Government to E-Business, 25-30
Low-cost AES
Rechberger C., Popp T., Tillich S.
Proceedings of Austrochip 2002, October 4, 2002, Graz, Austria, Austrochip 2008, 131-136
Elliptic Curve Cryptography in Practice — The Austrian Citizen Card for e-Government Applications
Großschädl J., Kamendje Tchokobou G., Oswald M., Posch R.
Proceedings of the International Conference on Advances in Infrastructure for Electronic Business, Education, Science and Medicine on the Internet (SSGRR 2002W), International Conference on Advances in Infrastructure for Electronic Business, Education, Science and Medicine on the Internet (SSGRR 2002W), -
A New Approach to DNS Security (DNSSEC)
Mangard S., Giuseppe A.
Proceedings of the Eighth ACM Conference on Computer and Communications Security (CCS-8), ACM Conference on Computer and Communications Security, 86-95
Search Techniques and Automata for Symbolic Model Checking
Bloem R.
, Doctoral Thesis
Divide and compose: SCC refinement for language emptiness
Wang C., Bloem R., Hachtel G., Ravi K., Somenzi F.
CONCUR 2001 - Concurrency Theory, International Conference on Concurrency Theory, 456-471, (Lecture notes in computer science)
A comparison of tree transductions defined by monadic second order logic and by attribute grammars
Bloem R., Engelfriet J.
Journal of Computer and System Sciences, Vol. 61(1), 1-50
An algorithm for strongly connected component analysis in n log n symbolic steps
Bloem R., Gabow H., Somenzi F.
International Conference on Formal Methods in Computer-Aided Design, International Conference on Formal Methods in Computer-Aided Design, 37-54
A comparative study of symbolic algorithms for the computation of fair cycles
Bloem R., Ravi K., Somenzi F.
International Conference on Formal Methods in Computer-Aided Design, International Conference on Formal Methods in Computer-Aided Design, 143-160
Symbolic guided search for CTL model checking
Bloem R., Ravi K., Somenzi F.
Design Automation Conference, 29-34
Efficient Büchi automata from LTL formulae
Bloem R., Somenzi F.
International Conference on Computer Aided Verification, Springer, 248-263
Approximations for fixpoint computations in symbolic model chec king
Bloem R., Moon I., Ravi K., Somenzi F.
World Multiconference on Systemics, Cybernetics and Informatics, 701-706
Efficient decision procedures for model checking of linear time logic properties
Bloem R., Ravi K., Somenzi F.
International Conference on Computer Aided Verification, International Conference on Computer Aided Verification, 222-235