We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
A Side-Channel Analysis Resistant Description of the AES S-box
Oswald M., Mangard S., Pramstaller N., Rijmen V.
Fast Software Encryption
Efficient AES Implementations on ASICs and FPGAs
Pramstaller N., Mangard S., Dominikus S., Wolkerstorfer J.
Proceedings of Fourth Conference on the Advanced Encryption Standard AES4
Masked Dual-Rail Pre-Charge Logic: DPA-Resistance without Routing Constraints
Popp T., Mangard S.
Cryptographic Hardware and Embedded Systems - CHES 2005
Traffic Classification using Self-Organizing Maps
Payer U., Lamberger M., Teufl P.
Proceedings of the Fifth International Network Conference, INC 2005 Fifth International Networking Conference Workshops
Massive Data Mining for Polymorphic Code Detection
Payer U., Teufl P., Kraxberger S., Lamberger M.
Computer Network Security
Hybrid Engine for Polymorphic Code Detection
Payer U., Teufl P., Lamberger M.
Detection of intrusions and malware, and vulnerability assessment
Formal verification of control software: A case study
Griesmayer A., Bloem R., Hautzendorfer M., Wotawa F.
Innovations in Applied Artificial Intelligence
Diagnosis is Repair
Staber S., Jobstmann B., Bloem R.
16th International Workshop on Principles of Diagnosis
Program Repair as a Game
Jobstmann B., Griesmayer A., Bloem R.
Computer Aided Verification
Repair of boolean programs using games
Griesmayer A., Bloem R.
Games in Design and Verification
Finding and Fixing Faults
Staber S., Jobstmann B., Bloem R.
Correct Hardware Design and Verification Methods
Identifikationsmodell der österreichischen Bürgerkarte
Leitold H., Roessler T.
D-A-CH
Identifying Obstacles in moving towards an Interoperable Electronic Identity Management System
Leitold H., Posch R., Hayat A.
Proceedings of eGOV INTEROP'05
C(I)IP Aktivitäten in Österreich
Leitold H., Posch R.
Preprints of CIP Europe 2005
E-Voting: A Scalable Approach using XML and Hardware Security Modules
Leitold H., Posch R., Roessler T.
Proceedings of eee2005
Interoperable Certification Authorities in the European Union - A Practical Solution
Hayat A., Rechberger C.
EGOV05 - International Conference on E-Government
Impact of Rotations in SHA-1 and Related Hash Functions
Pramstaller N., Rechberger C., Rijmen V.
Selected Areas in Cryptography
Analysis of simplified variants of SHA-256
Matusiewicz K., Pieprzyk J., Pramstaller N., Rechberger C., Rijmen V.
Western European Workshop on Research in Cryptology - WEWoCR 2005, LNI P-74 (ISSN 1617-5468)
Breaking a new Hash Function Design Strategy called SMASH
Pramstaller N., Rechberger C., Rijmen V.
Selected Areas in Cryptography
Recent results on SHA-1 and SHA-256
Rechberger C., Rijmen V.
Proceedings of Santa's Crypto Get-together 2005
