We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Security of IEEE 802.11 considering Power and EM Side-Channel Information
Rechberger C., Oswald M.
International Conference on Computing, Communications and Control Technologies (CCCT 2004)
Stream Ciphers and Side-Channel Analysis
Rechberger C., Oswald M.
SASC - The State of the Art of Stream Ciphers
Practical Template Attacks
Rechberger C., Oswald M.
Information Security Applications
A Highly Regular and Scalable AES Hardware Architecture
Mangard S., Aigner M., Dominikus S.
IEEE Transactions on Computers, Vol. 52(4), 2003
Exploiting Radiated Emissions - EM Attacks on Cryptographic ICs
Mangard S.
Proceedings of Austrochip 2003
A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion
Mangard S.
Information Security and Cryptology - ICISC 2002: 5th International Conference, Seoul, Korea, November 28-29, 2002. Revised Papers
Recent trends in computer-aided verification
Bloem R.
CoLogNET Newsletter, Vol. 5, 2003
Austrian e-Government and Citizen Card Initiatives
Leitold H., Posch R.
Proceedings of the 2nd NATO scientific conference on Security and Protection of Information
Verification and Fault Localization for VHDL Programs
Bloem R., Wotawa F.
Telematik, Vol. 8(2), 2002
Analysis of symbolic SCC hull algorithms
Bloem R., Somenzi F., Ravi K.
International Conference on Formal Methods in Computer-Aided Design
Fair simulation minimization
Bloem R., Gurumurthy S., Somenzi F.
International Conference on Computer Aided Verification
Identification and Confidentiality for e-Government
Leitold H., Posch R.
Certification and Security in E-Services: From E-Government to E-Business
Low-cost AES
Rechberger C., Popp T., Tillich S.
Proceedings of Austrochip 2002, October 4, 2002, Graz, Austria
Elliptic Curve Cryptography in Practice — The Austrian Citizen Card for e-Government Applications
Großschädl J., Kamendje Tchokobou G., Oswald M., Posch R.
Proceedings of the International Conference on Advances in Infrastructure for Electronic Business, Education, Science and Medicine on the Internet (SSGRR 2002W)
A New Approach to DNS Security (DNSSEC)
Mangard S., Giuseppe A.
Proceedings of the Eighth ACM Conference on Computer and Communications Security (CCS-8)
Search Techniques and Automata for Symbolic Model Checking
Bloem R.
Doctoral Thesis, 2001
Divide and compose: SCC refinement for language emptiness
Wang C., Bloem R., Hachtel G., Ravi K., Somenzi F.
CONCUR 2001 - Concurrency Theory
A comparison of tree transductions defined by monadic second order logic and by attribute grammars
Bloem R., Engelfriet J.
Journal of Computer and System Sciences, Vol. 61(1), 2000
An algorithm for strongly connected component analysis in n log n symbolic steps
Bloem R., Gabow H., Somenzi F.
International Conference on Formal Methods in Computer-Aided Design
A comparative study of symbolic algorithms for the computation of fair cycles
Bloem R., Ravi K., Somenzi F.
International Conference on Formal Methods in Computer-Aided Design
