We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Synthesis of Synchronization using Uninterpreted Functions
Bloem R., Hofferek G., Könighofer B., Könighofer R., Außerlechner S., Spörk R.
Proceedings of the 14th Conference on Formal Methods in Computer-Aided Design FMCAD 2014, International Conference on Formal Methods in Computer-Aided Design, 35-42
An Overview of Cloud Identity Management-Models
Zwattendorfer B., Zefferer T., Stranacher K.
Proceedings of the 10th International Conference on Web Information Systems and Technologies, 10th International Conference on Web Information Systems and Technologies, 82-92
Android Encryption Systems
Teufl P., Fitzek A., Hein D., Marsalek A., Oprisnik A., Zefferer T.
International Conference on Privacy & Security in Mobile Systems, International Conference on Privacy & Security in Mobile Systems
Automatic Error Localization for Software using Deductive Verification
Könighofer R., Tögl R., Bloem R.
Hardware and Software: Verification and Testing - Proceedings of the 10th International Haifa Verification Conference (HVC 2014), Haifa Verification Conference, 92-98, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8855)
An Optimistic Certified E-mail Protocol for the Current Internet E-mail Architecture
Tauber A.
IEEE Conference on Communications and Network Security, IEEE Conference on Communications and Network Security
SAT-based methods for circuit synthesis
Bloem R., Egly U., Klampfl P., Könighofer R., Lonsing F.
Formal Methods in Computer-Aided Design, International Conference on Formal Methods in Computer-Aided Design, 31-34
Branching Heuristics in Differential Collision Search with Applications to SHA-512
Eichlseder M., Mendel F., Schläffer M.
Fast Software Encryption. FSE 2014, 2014 Fast Software Encryption Workshop, 473-488, (Lecture Notes in Computer Science; vol. 8540)
Key Recovery Attacks on Recent Authenticated Ciphers
Bogdanov A., Dobraunig C., Eichlseder M., Lauridsen M., Mendel F., Schläffer M., Tischhauser E.
Progress in Cryptology - LATINCRYPT 2014, International Conference on Cryptology and Information Security in Latin America, 274-287, (LNCS)
SAT-Based Synthesis Methods for Safety Specs
Bloem R., Könighofer R., Seidl M.
Verification, Model Checking, and Abstract Interpretation, 15th International Conference, International Conference on Verification, Model Checking, and Abstract Interpretation, 1-20, (Lecture Notes in Computer Science; vol. 8318)
Multi-platform Operating System Kernels
Gruß D.
, Master's Thesis
A Server-Based Signature Solution for Mobile Devices
Zefferer T.
The 12th International Conference on Advances in Mobile Computing and Multimedia, 12th International Conference on Advances in Mobile Computing & Multimedia (MoMM2014), 175-184
STORK 2.0: Breaking New Grounds on eID and Mandates
Leitold H., Lioy A., Ribeiro C.
Proceedings of ID World International Congress, 2014 ID World International Congress, 1-8
Supporting Decision Making and Policy Through Large Scale Pilots
Leitold H.
Advances in Human Factors and Ergonomics 2014, 5th International Conference on Applied Human Factors and Ergonomics, 2669-2679
Identitätsmanagement in Österreich mit MOA-ID 2.0
Lenz T., Zwattendorfer B., Stranacher K., Tauber A.
eGovernment Review, 18-19
Malicious Hashing: Eve's Variant of SHA-1
Albertini A., Aumasson J., Eichlseder M., Mendel F., Schläffer M.
Selected Areas in Cryptography, International Workshop on Selected Areas in Cryptography, 1-19, (Lecture Notes in Computer Science; vol. 8781)
Keeping Secrets on Low-Cost Chips
Mangard S.
IEEE Security & Privacy, Vol. 11(4), 75-77
On the Relationship between Correlation Power Analysis and the Stochastic Approach: An ASIC Designer Perspective
De Santis F., Kasper M., Mangard S., Sigl G., Stein O., Stöttinger M.
International Conference on Cryptology in India, 215-226
Model-Based MCDC Testing of Complex Decisions for the Java Card Applet Firewall
Bloem R., Greimel K., Könighofer R., Röck F.
VALID Proceedings, International Conference on Advances in System Testing and Validation Lifecycle, 1-6
Harnessing Electronic Signatures to Improve the Security of SMS-based Services
Zefferer T., Tauber A., Zwattendorfer B.
Web Information Systems and Technologies, 331-346, (Lecture Notes in Business Information Processing)
The Austrian Identity Ecosystem – An e-Government Experience
Stranacher K., Tauber A., Zefferer T., Zwattendorfer B.
Architectures and Protocols for Secure Information Technology, IGI Global, 288-309, (Advances in Information Security, Privacy, and Ethics (AISPE))