We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Towards Interoperability: An Architecture for Pan-European eID-based Authentication Services
Tauber A., Zwattendorfer B., Zefferer T., Mazhari Y., Chamakiotis E.
Electronic Government and the Information Systems Perspective , 1st International Conference on Electronic Government and the Information Systems Perspective, 120-133, (Lecture Notes in Computer Science; vol. 6267)
STORK: Architecture, Implementation and Pilots
Leitold H., Zwattendorfer B.
ISSE 2010 Securing Electronic Business Processes, ISSE 2010 Security Conference, 131-142
Rebound Attacks on the Reduced Grøstl Hash Function
Mendel F., Rechberger C., Schläffer M., Thomsen S.
Topics in Cryptology - CT-RSA 2010, 10th Cryptographers' Track at the RSA Conference, 350-365, (Lecture Notes in Computer Science; vol. 5985)
Randomizing the Montgomery Multiplication to Repel Template Attacks on Multiplicative Masking
Medwed M., Herbst C.
Workshop Proceedings COSADE 201, 1st International Workshop on Constructive Side-Channel Analysis and Secure Design, 56-71
Practical Attacks on Masked Hardware
Popp T., Kirschbaum M., Mangard S.
Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, Cryptographers´ Track at the RSA Conference, 211-225, (Lecture Notes in Computer Science)
Better Quality in Synthesis through Quantitative Objectives
Bloem R., Chatterjee K., Henziger T., Jobstmann B.
International Conference on Computer Aided Verification, 140-156
STORK - Interoperable elektronische Identität in Europa
Ivkovic M., Leitold H., Rössler T.
7. Information Security Konferenz, Information Security Konferenz 2009, 175-190
Cryptanalysis of Hash Functions
Rechberger C.
, Doctoral Thesis
Cryptanalysis of Twister
Mendel F., Rechberger C., Schläffer M.
Applied Cryptography and Network Security, 7th International Conference on Applied Cryptography and Network Security, 342-353, (Lecture Notes in Computer Science; vol. 5536)
Cryptanalysis of Vortex
Aumasson J., Dunkelman O., Mendel F., Rechberger C., Thomsen S.
Lecture Notes in Computer Science, 2nd International Conference on Cryptology in Africa, 14-28, (LNCS)
Wie lange halten die SHA-2 Hashfunktionen kryptanalytischen Angriffen noch stand?
Rechberger C.
Tagungsband 11. Deutscher IT-Sicherheitskongress, Deutscher IT-Sicherheitskongress
Cryptanalysis of MDC-2
Knudsen L., Mendel F., Rechberger C., Thomsen S.
Advances in Cryptology - EUROCRYPT 2009, Eurocrypt - International Conference on the Theory and Applications of Cryptographic Techniques, 106-120, (LNCS)
Elektronische Vollmachten im österreichischen E-Government
Tauber A., Rössler T.
eGovernment Review, Vol. 4, 22-23
Ausländische Identitäten im österreichischen E-Government
Stranacher K., Tauber A., Rössler T.
Arbeitskonferenz DACH Security, 263-272
Interoperability: Coupling of e-Delivery Domains
Rössler T., Tauber A.
Proceedings of the 8th International Conference on Ongoing Research, General Development Issues and Projects of Electronic Government (EGOV 09), Eighth International Conference EGOV 2008, 247-254, (Schriftenreihe Informatik)
Synthesizing Robust Systems
Bloem R., Greimel K., Henzinger T., Jobstmann B.
Proceedings of 9th International Conference on Formal Methods in Computer-Aided Design, FMCAD 2009, 85-92
Professional Representation in Austrian EGovernment
Tauber A., Rössler T.
Proceedings of the 8th International Conference EGOV 2009, Eighth International Conference EGOV 2009, 388-398, (Lecture Notes in Computer Science (LNCS))
Requirements for Electronic Delivery Systems in E-Government – An Austrian Experience
Tauber A.
Software Services for e-Business and e-Society: Proceedings of the 9th IFIP WG6.1 Conference, 9th IFIP WG 6.1 Conference on e-Business, e-Services and e-Society, I3E 2009, 123-133, (IFIP AICT)
Debugging Formal Specifications Using Simple Counterstrategies
Könighofer R., Hofferek G., Bloem R.
Proceedings of 9th International Conference 2009 Formal Methods in Computer Aided Design FMCAD 2009, 9th International Conference Formal Methods in Computer Aided Design, 152-159