We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Protecting AES Software Implementations on 32-bit Processors against Power Analysis
Tillich S., Herbst C., Mangard S.
Applied Cryptography and Network Security
Power and EM Attacks on Passive 13.56 MHz RFID Devices
Hutter M., Mangard S., Feldhofer M.
Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings
Template Attacks on Masking - Resistance Is Futile
Oswald E., Mangard S.
Cryptographers´ Track at the RSA Conference
Evaluation of the Masked Logic Style MDPL on a Prototype Chip
Popp T., Kirschbaum M., Zefferer T., Mangard S.
Cryptographic Hardware and Embedded Systems - CHES 2007
Symbolic Implementation of Alternating Automata
Bloem R., Cimatti A., Pill I., Roveri M.
International journal of foundations of computer science, Vol. 18(4), 2007
Specify, Compile, Run: Hardware from PSL
Bloem R., Galler S., Jobstmann B., Piterman N., Pnueli A., Weiglhofer M.
6th International Workshop on Compiler Optimization Meets Compiler Verification
Anzu: A Tool for Property Synthesis
Jobstmann B., Galler S., Weiglhofer M., Bloem R.
Proceedings of the 19th International Conference of Computer Aided Verification 2007
Interactive presentation: Automatic hardware synthesis from specifications: a case study
Bloem R., Galler S., Jobstmann B., Piterman N., Pnueli A., Weiglhofer M.
Proceedings of the conference on Design, automation and test in Europe
RAT: A Tool for the Formal Analysis of Requirements
Bloem R., Cavada R., Pill I., Roveri M., Tchaltsev A.
19th International Conference, CAV 2007, Berlin, Germany, July 3-7, 2007. Proceedings
Fault localization and correction with QBF
Staber S., Bloem R.
Theory and Applications of Satisfiability Testing – SAT 2007
Attacking DPA-Resistant Logic Styles in Practice
Zefferer T.
Master's Thesis, 2007
Current Status of SHA-1
Mendel F., Pramstaller N., Rechberger C., Rijmen V.
2007
Collisions for 70-step SHA-1: On the Full Cost of Collision Search
De Cannière C., Mendel F., Rechberger C.
Selected Areas in Cryptography
The Grindahl hash functions
Knudsen L., Rechberger C., Thomsen S.
Fast Software Encryption (FSE) 2007
On Authentication With HMAC and Non-Rondom Properties
Rechberger C., Rijmen V.
Financial Cryptography 2007
The SHA Family of Hash Functions: Recent Results
Rechberger C., Rijmen V.
Proceedings of Security and Protection of Information 2007
Second Preimages for SMASH
Lamberger M., Pramstaller N., Rechberger C., Rijmen V.
Cryptographers´ Track at the RSA Conference
Strategische Technologien für das E-Government
Posch R.
Menschenrechte in der Informationsgesellschaft, Boorberg, 233-256, 2007
Zukunftsperspektive Sichere Verwaltung
Posch R.
Verwaltung im Umbruch, Neuer Wissenschaftlicher Verlag GmbH Nfg KG, 91-100, 2007
