We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Security Layer on Small Devices
Tauber A.
Master's Thesis, 2005
Giving an Interoperable Solution for Incorporating Foreign eIDs in Austrian E-Government",
Roessler T., Posch R., Hayat A.
Proceedings of IDABC-Conference 2005
Exploiting Coding Theory for Collision Attacks on SHA-1
Pramstaller N., Rechberger C., Rijmen V.
Cryptography and Coding. Cryptography and Coding 2005
SCARD D1.2 Requirement Specification Report
Aigner M., Mangard S., Popp T.
2004
Securing Implementations of Block Ciphers against Side-Channel Attacks
Mangard S.
Doctoral Thesis, 2004
A Masked AES ASIC Implementation
Pramstaller N., Oswald M., Mangard S., Gürkaynak F., Häne S.
Proceedings of Austrochip 2004
Hardware Countermeasures Against DPA – A Statistical Analysis of Their Effectiveness
Mangard S.
Topics in Cryptology - CT-RSA 2004
The Austrian Citizen Card: A Bottom-Up View
Leitold H., Posch K.
Security and Privacy in Advanced Networking Technologies, IOS Press, 231-236, 2004
Technische Aspekte des E-Voting
Leitold H.
Journal für Rechtspolitik, Vol. 12(2), 2004
What to Expect from Biometrics
Leitold H., Posch R.
Proceedings of BSI Biometrieworkshop
Identification in cross-border e-Government
Leitold H., Posch R., Roessler T.
European Conference on E-Government
Security of IEEE 802.11 considering Power and EM Side-Channel Information
Rechberger C., Oswald M.
International Conference on Computing, Communications and Control Technologies (CCCT 2004)
Stream Ciphers and Side-Channel Analysis
Rechberger C., Oswald M.
SASC - The State of the Art of Stream Ciphers
Practical Template Attacks
Rechberger C., Oswald M.
Information Security Applications
A Highly Regular and Scalable AES Hardware Architecture
Mangard S., Aigner M., Dominikus S.
IEEE Transactions on Computers, Vol. 52(4), 2003
Exploiting Radiated Emissions - EM Attacks on Cryptographic ICs
Mangard S.
Proceedings of Austrochip 2003
A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion
Mangard S.
Information Security and Cryptology - ICISC 2002: 5th International Conference, Seoul, Korea, November 28-29, 2002. Revised Papers
Recent trends in computer-aided verification
Bloem R.
CoLogNET Newsletter, Vol. 5, 2003
Austrian e-Government and Citizen Card Initiatives
Leitold H., Posch R.
Proceedings of the 2nd NATO scientific conference on Security and Protection of Information
Verification and Fault Localization for VHDL Programs
Bloem R., Wotawa F.
Telematik, Vol. 8(2), 2002
