We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Pinpointing the Side-Channel Leakage of Masked CMOS Implementations
Mangard S., Schramm K.
Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop on Cryptographic Hardware and Embedded Systems, 76-90, (Lecture Notes in Computer Science)
Side Channel Analysis Resistant Design Flow
Aigner M., Popp T., Mangard S., Trifiletti A., Menicocci R., Olivieri M., Scotti G.
IEEE International Symposium on Circuits and Systems, IEEE International Symposium on Circuits and Systems, 2209-2212
WiFi Chipset Fingerprinting
Lackner G., Lamberger M., Teufl P., Payer U.
D-A-CH mobility 2006, Arbeitskonferenz D-A-CH Mobility 2006, 41-53
Compositional SCC analysis for language emptiness
Wang C., Bloem R., Hachtel G., Ravi K., Somenzi F.
Formal Methods in System Design, Vol. 28(1), 5-36
Symbolic implementation of alternating automata
Pill I., Bloem R., Cimatti A., Roveri M., Semprini S.
Implementation and application of automata, International Conference on Implementation and Application of Automata, 208-218
Formal analysis of hardware requirements
Pill I., Bloem R., Semprini S., Roveri M., Cimatti A., Cavada R.
Design Automation Conference, Association for Computing Machinery (ACM), 821-826
Repair of boolean programs with an application to C
Griesmayer A., Bloem R., Byron C.
Computer Aided Verification, International Conference on Computer Aided Verification, 358-371, (LNCS)
Automated Fault Localization for C Programs
Griesmayer A., Staber S., Bloem R.
Workshop on Verification and Debugging, Workshop on Verification and Debugging, 82-99
Game-based and simulation-based improvements for LTL synthesis
Jobstmann B., Bloem R.
Games in Design and Verification, Games in Design and Verification, ?-?
Rat: A tool for formal analysis of requirements
Pill I., Bloem R., Cimatti A., Roveri M., Semprini S., Tchaltsev A.
European Conference on Artificial Intelligence, European Conference on Artificial Intelligence, ?-?
Automatic Fault Localization for Property Checking
Staber S., Fey G., Bloem R., Drechsler R.
Haifa Verification Conference, Haifa Verification Conference
Optimizations for LTL synthesis
Jobstmann B., Bloem R.
International Conference on Formal Methods in Computer-Aided Design, International Conference on Formal Methods in Computer-Aided Design, ?-?
Identification in E-Government: An Overview of Approaches
Leitold H., Posch R.
Encyclopedia of Digital Government, IDEA Group, 984-987
Communications and Multimedia Security
Leitold H., Markatos E.
, Springer Berlin / Heidelberg, (LNCS)
D.VAM11 -- Suggested Algorithms for Light-Weight Cryptography
Aigner M., Dominikus S., Feldhofer M., Rechberger C., Oswald M.
, (ECRYPT Deliverable)
The NIST Cryptographic Workshop on Hash Functions
Rechberger C., Rijmen V., Sklavos N.
IEEE Security & Privacy, Vol. 4(1), 54-56
Finding SHA-1 Characteristics: General Results and Applications
De Cannière C., Rechberger C.
Advances in Cryptology - Asiacrypt 2006, International Conference on the Theory and Application of Cryptology and Information Security, 1-20, (Lecture notes in computer science)
Threshold Implementations Against Side-Channel Attacks and Glitches
Nikova S., Rechberger C., Rijmen V.
Information and Communications Security, International Conference on Information and Communications Security, 529-545, (LNCS)
A Compact FPGA Implementation of the Hash Function Whirlpool
Pramstaller N., Rechberger C., Rijmen V.
Fourteenth ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, Association for Computing Machinery (ACM), 159-166
The Impact of Carries on the Complexity of Collision Attacks on SHA-1
Mendel F., Pramstaller N., Rechberger C., Rijmen V.
Fast Software Encryption. FSE 2006, 13th International Fast Software Encryption Workshop, 278-292, (Lecture Notes in Computer Science; vol. 4047)