We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Towards a Modular Architecture for Adaptable Signature-Verification Tools
Lenz T., Stranacher K., Zefferer T.
Proceedings of the 9th International Conference on Web Information Systems and Technologies, 9th International Conference on Web Information Systems and Technologies, 325-334
Effizientes Testen von E-Government Komponenten in der Cloud
Krnjic V., Könighofer P., Zefferer T., Zwattendorfer B.
Arbeitskonferenz DACH Security, Arbeitskonferenz DACH Security, 225-236
Assessment of Redactable Signature Schemes for Trusted and Reliable Public Sector Data
Stranacher K., Krnjic V., Zwattendorfer B., Zefferer T.
Proceedings of the 13th European Conference on e-Government, 13th European Conference on E-Government, 508-516
Middleware Architecture for Cross-Border Identification and Authentication
Zwattendorfer B., Sumelong I., Leitold H.
Journal of Information Assurance and Security , Vol. 8(3), 107-118
The INDI Ecosystem of privacy-aware, user-centric Identity
Leontaridis L., Andersson T., Leitold H., Zwattendorfer B., Yang S., Lindholm P.
ISSE 2013 - Securing Electronic Business Processes, 2013 Information Security Solutions Europe Conference, 45-57
The Public Cloud for e-Government
Zwattendorfer B., Tauber A.
International Journal of Distributed Systems and Technologies , Vol. 4(4)
Cross-border certified electronic mailing: A European perspective
Tauber A., Kustor P., Karning B.
Computer Law & Security Review , Vol. 29(1), 28-39
Elektronische Identität und Stellvertretung in Österreich
Tauber A., Zwattendorfer B., Stranacher K.
D-A-CH Security 2013, Arbeitskonferenz DACH Security, 1-9
A Secure and Confidential Javascript Crypto-Framework for Cloud Storage Applications
Lenz T., Zwattendorfer B., Tauber A.
IADIS International Conference WWW/INTERNET, IADIS International Conference WWW/INTERNET, 219-226
Linear Propagation in Efficient Guess-and-Determine Attacks
Eichlseder M., Mendel F., Nad T., Rijmen V., Schläffer M.
International Workshop on Coding and Cryptography, 2013 International Workshop on Coding and Cryptography, 193-202
Finding Collisions for Round-Reduced SM3
Mendel F., Nad T., Schläffer M.
Topics in Cryptology - CT-RSA 2013, Cryptographers' Track at the RSA Conference 2013, 174-188, (Lecture Notes in Computer Science; vol. 7779)
Improving Local Collisions: New Attacks on Reduced SHA-256
Mendel F., Nad T., Schläffer M.
Advances in Cryptology – EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques , 262-278
Differential Cryptanalysis of Keccak Variants
Kölbl S., Mendel F., Nad T., Schläffer M.
Cryptography and Coding, 14th IMA International Conference on Cryptography and Coding, 141-157, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics))
Die physikalische Sicherheit eingebetteter Systeme
Mangard S.
Datenschutz und Datensicherheit, Vol. 36, 867-871
Exploiting the Difference of Side-Channel Leakages
Hutter M., Kirschbaum M., Plos T., Schmidt J., Mangard S.
Constructive Side-Channel Analysis and Secure Design - COSADE 2012, 3rd International Workshop, Darmstadt, Germany, May 3-4, 2012, Proceedings., International Workshop on Constructive Side-Channel Analysis and Secure Design, 1-16, (Lecture Notes in Computer Science)
Localized Electromagnetic Analysis of Cryptographic Implementations
Heyszl J., Mangard S., Heinz B., Stumpf F., Sigl G.
Cryptographers´ Track at the RSA Conference, 231-244
Parameterized Synthesis
Bloem R., Jacobs S.
Tools and Algorithms for the Construction and Analysis of Systems, International Conference on Tools and Algorithms for the Construction and Analysis of Systems, 362-376, (Lecture notes in computer science)
Open Source Bausteine als Kooperationsgrundlage
Posch R., Orthacker C., Stranacher K., Tauber A., Zefferer T., Zwattendorfer B.
E-Government - Zwischen Partizipation und Kooperation, Springer, 185-209