explore Our
Publications
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Herbst C., Medwed M.
9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers, WISA - Workshop on Information Security Applications, 1-13, (Lecture Notes in Computer Science)
Nad T., Lamberger M., Rijmen V.
Journal of Mathematical Cryptology, Vol. 3(3), 249-263
Leitold H., Posch R., Rössler T.
Emerging Challenges for Security, Privacy, and Trust , 24th IFIP TC 11 International Information Security Conference, 109-118, (IFIP Advances in Information and Communication Technologies; vol. 297)
Mendel F., Rechberger C., Schläffer M., Thomsen S.
Fast Software Encryption. FSE 2009, 16th International Fast Software Encryption Workshop, 260-276, (Lecture Notes in Computer Science; vol. 5665)
Lamberger M., Mendel F., Rechberger C., Rijmen V., Schläffer M.
Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, 126-143, (Lecture Notes in Computer Science; vol. 5912)
Mendel F., Rechberger C., Schläffer M.
Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, 144-161, (Lecture Notes in Computer Science; vol. 5912)
Mendel F., Peyrin T., Rechberger C., Schläffer M.
Selected Areas in Cryptography. SAC 2009, International Workshop on Selected Areas in Cryptography, 16-35, (Lecture Notes in Computer Science; vol. 5867)
Nad T., Mendel F., Schläffer M.
Applied Cryptography and Network Security. ACNS 2009, 7th International Conference on Applied Cryptography and Network Security, 369-381, (Lecture Notes in Computer Science; vol. 5536)
Nad T., Mendel F.
Progress in Cryptology - INDOCRYPT 2009, 10th International Conference on Cryptology in India, 219-232, (Lecture Notes in Computer Science; vol. 5922)
Tögl R., Hofferek G., Greimel K., Leung A., Phan R., Bloem R.
International Symposium on Trusted Computing (TrustCom 2008) Proceedings, in 9th ICYCS Conference Proceedings, International Symposium on Trusted Computing, 2289-2294
Suelflow A., Fey G., Bloem R., Drechsler R.
Methoden und Beschreibungssprachen zur Modellierung und Verifikation von Schaltungen und Systemen, Workshop Methoden und Beschreibungssprachen zur Modellierung und Verifikation von Schaltungen und Systemen, 159-168
Lamberger M., Pramstaller N., Rechberger C., Rijmen V.
IEEE Transactions on Information Theory, Vol. 54(8), 3647-3655
Rechberger C., Rijmen V.
Journal of Universal Computer Science , Vol. 14(3), 347-376
Aumasson J., Fischer S., Khazaei S., Meier W., Rechberger C.
Fast Software Encryption Workshop, Springer, 470-488
Hölbl M., Rechberger C., Welzer T.
Proceedings of Western European Workshop on Research in Cryptology, Western European Workshop on Research in Cryptology, 28-38, (Lecture notes in computer science)
Fey G., Staber S., Bloem R., Drechsler R.
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Vol. 27(6), 1138-1149
Greimel K., Bloem R., Jobstmann B., Vardi M.
Automata, Languages and Programming - ICALP 2008, 2008 International Colloquium on Automata, Languages and Programming, 361-372, (Lecture Notes in Computer Science; vol. 5126)
Suelflow A., Fey G., Bloem R., Drechsler R.
GLSVLSI '08: Proceedings of the 18th ACM Great Lakes symposium on VLSI, 18th ACM Great Lakes Symposium on VLSI, 77-82