We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Side-Channel Leakage Across Borders
Schmidt J., Plos T., Kirschbaum M., Hutter M., Medwed M., Herbst C.
Smart Card Research and Advanced Applications 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010
Robustness in the Presence of Liveness
Bloem R., Chatterjee K., Greimel K., Henzinger T., Jobstmann B.
Computer Aided Verification
RATSY - A new Requirements Analysis Tool with Synthesis
Bloem R., Cimatti A., Greimel K., Hofferek G., Könighofer R., Roveri M., Schuppan V., Seeber R.
Computer Aided Verification
An Electronic-signature Based Circular Resolution Database System
Zefferer T., Knall T.
Proceedings of the 25th Annual ACM Symposium on Applied Computing 2010
Towards Interoperability: An Architecture for Pan-European eID-based Authentication Services
Tauber A., Zwattendorfer B., Zefferer T., Mazhari Y., Chamakiotis E.
Electronic Government and the Information Systems Perspective
STORK: Architecture, Implementation and Pilots
Leitold H., Zwattendorfer B.
ISSE 2010 Securing Electronic Business Processes
Rebound Attacks on the Reduced Grøstl Hash Function
Mendel F., Rechberger C., Schläffer M., Thomsen S.
Topics in Cryptology - CT-RSA 2010
Randomizing the Montgomery Multiplication to Repel Template Attacks on Multiplicative Masking
Medwed M., Herbst C.
Workshop Proceedings COSADE 201
Practical Attacks on Masked Hardware
Popp T., Kirschbaum M., Mangard S.
Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009
Wireless LAN MAC-Layer Address Spoofing with Fingerprinting Methods
Lackner G., Payer U., Teufl P.
International journal of network security, Vol. Vol. 9(No. 2), 2009
Unterschätzes Risiko durch ultramobile Geräte
Lackner G., Teufl P., Weinberger R.
7. Information Security Konferenz
Better Quality in Synthesis through Quantitative Objectives
Bloem R., Chatterjee K., Henziger T., Jobstmann B.
International Conference on Computer Aided Verification
STORK - Interoperable elektronische Identität in Europa
Ivkovic M., Leitold H., Rössler T.
7. Information Security Konferenz
Cryptanalysis of Hash Functions
Rechberger C.
Doctoral Thesis, 2009
Cryptanalysis of Twister
Mendel F., Rechberger C., Schläffer M.
Applied Cryptography and Network Security
Cryptanalysis of Vortex
Aumasson J., Dunkelman O., Mendel F., Rechberger C., Thomsen S.
Lecture Notes in Computer Science
Wie lange halten die SHA-2 Hashfunktionen kryptanalytischen Angriffen noch stand?
Rechberger C.
Tagungsband 11. Deutscher IT-Sicherheitskongress
Cryptanalysis of MDC-2
Knudsen L., Mendel F., Rechberger C., Thomsen S.
Advances in Cryptology - EUROCRYPT 2009
