explore Our
Publications
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Pill I., Bloem R., Cimatti A., Roveri M., Semprini S.
Implementation and application of automata, International Conference on Implementation and Application of Automata, 208-218
Pill I., Bloem R., Semprini S., Roveri M., Cimatti A., Cavada R.
Design Automation Conference, Association of Computing Machinery, 821-826
Griesmayer A., Bloem R., Byron C.
Computer Aided Verification, International Conference on Computer Aided Verification, 358-371, (LNCS)
Griesmayer A., Staber S., Bloem R.
Workshop on Verification and Debugging, Workshop on Verification and Debugging, 82-99
Jobstmann B., Bloem R.
Games in Design and Verification, Games in Design and Verification, ?-?
Pill I., Bloem R., Cimatti A., Roveri M., Semprini S., Tchaltsev A.
European Conference on Artificial Intelligence, European Conference on Artificial Intelligence, ?-?
Staber S., Fey G., Bloem R., Drechsler R.
Haifa Verification Conference, Haifa Verification Conference
Jobstmann B., Bloem R.
International Conference on Formal Methods in Computer-Aided Design, International Conference on Formal Methods in Computer-Aided Design, ?-?
Leitold H., Posch R.
Encyclopedia of Digital Government, IDEA Group, 984-987
Leitold H., Markatos E.
, Springer Berlin / Heidelberg, (LNCS)
Aigner M., Dominikus S., Feldhofer M., Rechberger C., Oswald M.
, (ECRYPT Deliverable)
Rechberger C., Rijmen V., Sklavos N.
IEEE Security & Privacy, Vol. 4(1), 54-56
De Cannière C., Rechberger C.
Advances in Cryptology - Asiacrypt 2006, International Conference on the Theory and Application of Cryptology and Information Security, 1-20, (Lecture notes in computer science)
Nikova S., Rechberger C., Rijmen V.
Information and Communications Security, International Conference on Information and Communications Security, 529-545, (LNCS)
Pramstaller N., Rechberger C., Rijmen V.
Fourteenth ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, Association of Computing Machinery, 159-166
Mendel F., Pramstaller N., Rechberger C., Rijmen V.
Fast Software Encryption. FSE 2006, 13th International Fast Software Encryption Workshop, 278-292, (Lecture Notes in Computer Science; vol. 4047)
Feldhofer M., Rechberger C.
On the Move to Meaningful Internet Systems 2006, OTM, 372-381, (Lecture Notes in Computer Science)
Feldhofer M., Rechberger C.
Workshop on RFID Security 2006, Workshop on RFID Security 2006, 109-122
Mendel F., Pramstaller N., Rechberger C., Rijmen V.
Information Security. ISC 2006, 9th International Information Security Conference, 101-116, (Lecture Notes in Computer Science; vol. 4176)
Mendel F., Pramstaller N., Rechberger C.
Information Security and Cryptology – ICISC 2006, 9th International Conference on Information Security and Cryptology, 8-21, (Lecture Notes in Computer Science; vol. 4296)