Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output 1983 2019

(Kopie von) FutureID, WP 35: Trustworthy Client Platform, D35.1 - Requirements Report

Kamm, F-M., Houdeau, D., Lipp, P., Rath, C., Wagner, C., Sepehrdad, P. & Neven, G., 2013, .

Research output: Book/ReportOther reportResearch

8/16/32 Shades of Elliptic Curve Cryptography on Embedded Processors

Wenger, E., Unterluggauer, T. & Werner, M., 2013, Progress in Cryptology - INDOCRYPT 2013, 14th International Conference on Cryptology in India, Mumbai, India, December 2013, Proceedings. Berlin Heidelberg: Springer, p. 244-261

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

A (Second) Preimage Attack on the GOST Hash Function

Mendel, F., Pramstaller, N. & Rechberger, C., 2008, Fast Software Encryption. Springer, Vol. 5086. p. 224-234 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

A 16-Bit Microprocessor Chip for Cryptographic Operations on Low-Resource Devices

Wenger, E., Feldhofer, M. & Felber, N., 2010, Austrochip 2010. Spittal: Fachhochschule Kärnten, p. 55-60

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

A Bit-Serial Unified Multiplier Architecture for Finite Fields GF(p) and GF(2m)

Großschädl, J., 2001, Cryptographic Hardware and Embedded Systems — CHES 2001. Berlin: Springer Verlag, Vol. 2162. p. 202-219 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

A browser-based JavaScript Solution for easy Smart Card-Access to European eIDs

Lenz, T., Zwattendorfer, B. & Hutzler, A., 2015, (Accepted/In press) Central and Eastern European eGov Days. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

A Case Against Currently Used Hash Functions in RFID Protocols

Feldhofer, M. & Rechberger, C., 2006, Workshop on RFID Security 2006. Meersman, R., Tari, Z. & Herrero, P. (eds.). ., p. 109-122

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

A Case Against Currently Used Hash Functions in RFID Protocols

Feldhofer, M. & Rechberger, C., 2006, On the Move to Meaningful Internet Systems 2006. Meersman, R., Tari, Z. & Herrero, P. (eds.). Berlin [u.a.]: Springer, Vol. 4277. p. 372-381 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Accelerating AES Using Instruction Set Extensions for Elliptic Curve Cryptography

Tillich, S. & Großschädl, J., 2005, Computational Science and Its Applications / Pt. 2. Gervasi, O. (ed.). Berlin: Spinger, Vol. 3481. p. 665-675 (Lecture notes in computer science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Accessibility Challenges in e-Government: an Austrian Experience

Orthacker, C. & Zefferer, T., 2011, Proceedings of the Forth International Conference on Internet Technologies and Applications (ITA 11). ., p. 221-228

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Access Without Permission: A Practical RFID Relay Attack

Silberschneider, R., Korak, T. & Hutter, M., 2013, Austrochip 2013, 21st Austrian Workshop on Microelectronics, Linz, Austria, October 10, 2013, Proceedings. Linz: ., p. 59-64

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

A Chemical Memory Snapshot

Schmidt, J-M., 2008, Smart Card Research and Advanced Applications - CARDIS 2008. Berlin / Heidelberg: Springer, Vol. 5189. p. 283-289 (Lecture Notes in Computer Science (LNCS)).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

A Compact FPGA Implementation of the Hash Function Whirlpool

Pramstaller, N., Rechberger, C. & Rijmen, V., 2006, Fourteenth ACM/SIGDA International Symposium on Field-Programmable Gate Arrays. Association of Computing Machinery, p. 159-166

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

A Comparative Study of Misapplied Crypto in Android and iOS Applications

Feichtner, J., 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT. Portugal: SciTePress, p. 96-108 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programs
Application programming interfaces (API)
Cryptography
iOS (operating system)
Android (operating system)

A Comparative Survey of Cloud Identity Management-Models

Zwattendorfer, B., Zefferer, T. & Stranacher, K., 2014, Web Information Systems and Technologies 2014. 1 ed. Springer, p. 128-144

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

A Concept for Controlling Security-Enhanced RFID Smart Tags using Embedded Microcontrollers

Feldhofer, M., 2003

Research output: ThesisDiploma ThesisResearch

A Continuous Fault Countermeasure for AES Providing a Constant Error Detection Rate

Medwed, M. & Schmidt, J-M., 2010, 7th Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2010. IEEE-CS Press, p. 66-71

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

A Correctable Public Blockchain

Marsalek, A. & Zefferer, T., 2019, (Accepted/In press) 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE Trustcom-19).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Decision making
Experiments

A Counting Semantics for Monitoring LTL Specifications over Finite Traces

Bartocci, E., Bloem, R., Nickovic, D. & Röck, F., 2018, Computer Aided Verification : 30th International Conference, CAV 2018, Held as Part of the Federated Logic Conference, FloC 2018, Oxford, UK, July 14-17, 2018, Proceedings, Part I. Vol. 1. p. 547-564 18 p. (Lecture Notes in Computer Science; vol. 10980).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access

A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES like Sardines

Hutter, M., Feldhofer, M. & Wolkerstorfer, J., 2011, Information Security Theory and Practices - WISTP 2011, 5th International Workshop, Heraklion, Greece, June 1-3, 2011, Proceedings.. ., Vol. 6633. p. 144-159 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Active Implementation Attacks - Final Report

Schmidt, J-M. & Medwed, M., 2009, .

Research output: Book/ReportOther reportResearch

acTvSM: A Dynamic Virtualization Platform for Enforcement of Application Integrity

Tögl, R., Pirker, M. & Gissing, M., 2011, (Accepted/In press) Trusted Systems, Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers. Berlin; Heidelberg: Springer Verlag, Vol. 6802. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

acTvSM Deliverable 2.1: Requirements Specification Report

Pirker, M., Tögl, R. & Lindsberger, G., 2010, .

Research output: Book/ReportCommissioned reportResearch

acTvSM Deliverable 3.1: Virtual Platform Prototype

Pirker, M., Tögl, R. & Niederl, A., 2010, .

Research output: Book/ReportOther reportResearch

acTvSM Deliverable 3.2: Virtual Trusted Platform Prototype

Tögl, R., Pirker, M., Niederl, A. & Gissing, M., 2010, .

Research output: Book/ReportOther reportResearch

acTvSM Deliverable 4.1: Draft API Design

Tögl, R., Pirker, M. & Fliess, G., 2010, .

Research output: Book/ReportOther reportResearch

acTvSM Deliverable 4.1.1: API Analysis Scope

Tögl, R., 2010, .

Research output: Book/ReportOther reportResearch

acTvSM Deliverable 4.2: Revised API Design

Tögl, R. & Reimair, F., 2011, .

Research output: Book/ReportOther reportResearch

acTvSM Deliverable 4.3: Verification Report

Tögl, R., 2011, .

Research output: Book/ReportOther reportResearch

acTvSM Deliverable 5.1: TvSM Prototype

Reimair, F. & Tögl, R., 2011, .

Research output: Book/ReportOther reportResearch

acTvSM Deliverable 6.1: Business Model and Product Roadmap

Tögl, R., Pirker, M., Bloem, R. P., Lindsberger, G. & Posch, S., 2011, .

Research output: Book/ReportOther reportResearch

acTvSM virtualization platform

Niederl, A., Pirker, M., Tögl, R., Gebetsroither, M. & Gissing, M., 2010

Research output: Non-print formWebsite / Web publicationResearch

Adding Controllable Linkability to Pairing-Based Group Signatures For Free

Slamanig, D., Spreitzer, R. C. & Unterluggauer, T., 2014, 17th International Conference on Information Security, ISC 2014. LNCS ed. Springer Verlag, Vol. 8783. p. 388-400

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Cryptography
Costs

A Distinguisher for the Compression Function of SIMD-512

Nad, T. & Mendel, F., 2009, Progress in Cryptology - INDOCRYPT 2009. Roy, B. & Sendrier, N. (eds.). Springer, Vol. 5922. p. 219-232 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

A Dual-FPGA Approach for Evaluation of Countermeasures against Power Analysis

Schgaguler, K., Tillich, S. & Bock, H., 2006, Proceedings of Austrochip 2006. ., p. 163-168

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Advanced Encryption Standard - AES4

Rijmen, V. (ed.), 2005, Berlin: Springer. (Lecture Notes in Computer Science)

Research output: Book/ReportBookResearch

Advanced Qualified Signature Format Specification and Framework

Claessens, J., Leitold, H., Orthacker, C., Quasim, A., Starostin, D., Stranacher, K. & Zwattendorfer, B., 2007, .

Research output: Book/ReportCommissioned reportResearch

Advancing Democracy, Government and Governance

Kö, A. (ed.), Leitner, C. (ed.), Leitold, H. (ed.) & Prosser, A. (ed.), 2012, 1 ed. Graz: Springer. (LNCS)

Research output: Book/ReportBookResearchpeer-review

AES-Based Lightweight Authenticated Encryption

Bogdanov, A., Mendel, F., Regazzoni, F., Rijmen, V. & Tischhauser, E., 2013, Fast Software Encryption. Springer, Vol. 8424. p. 447-466 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

AES - Eine Analyse der Sicherheit des Rijndael-Algorithmus

Oswald, M. E., 2002, .

Research output: Book/ReportCommissioned reportResearch

AES Implementation on a Grain of Sand

Feldhofer, M., Wolkerstorfer, J. & Rijmen, V., 2005, In : IEE proceedings / information security. 152, 1, p. 13-20

Research output: Contribution to journalArticleResearchpeer-review

A Fast and Cache-Timing Resistant Implementation of the AES

Könighofer, R., 2008, Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 2008, Proceedings. Malkin, T. (ed.). Berlin Heidelberg: Springer, Vol. 4964. p. 187-202 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

A Fault Attack on ECDSA

Schmidt, J-M. & Medwed, M., 2009, 6th Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2009, Proceedings. Breveglieri, L. (ed.). IEEE-CS Press, p. 93-99

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

A Federated Cloud Identity Broker-Model for Enhanced Privacy via Proxy Re-Encryption

Zwattendorfer, B., Slamanig, D., Stranacher, K. & Hörandner, F., 2014, 15th IFIP TC6/TC11 International Conference on Communications and Multimedia Security, CMS'2014, September 25th - 26th, 2014, Aveiro, Portugal. LNCS ed. Springer Verlag, Vol. 8735 . p. 92-103

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

A Federation of Federations: Secure Cloud Federations meet European Identity Federations

Zefferer, T., Ziegler, D. & Reiter, A., Mar 2018, In : International Journal for Information Security Research. Volume 8, Issue 1

Research output: Contribution to journalArticleResearchpeer-review

A flexible software development and emulation framework for ARM TrustZone

Wiegele, P., Winter, J., Pirker, M. & Tögl, R., 2012, Trusted Systems; Proc. INTRUST. Berlin Heidelberg: Springer, Vol. 7222. p. 1-15 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

A Framework for Privacy-Preserving Mobile Payment on Security Enhanced ARM TrustZone Platforms

Pirker, M. & Slamanig, D., 2012, Proceedings of the 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). Washington, DC, USA: IEEE Computer Society, p. 1155-1160

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

A General Framework for Redactable Signatures and New Constructions

Derler, D., Pöhls, H., Samelin, K. & Slamanig, D., 2015, 18th Annual International Conference on Information Security and Cryptology, ICISC 2015, November 25-27, Seoul, Korea.. LNCS ed. Springer Verlag, Vol. 9558 .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

A Generic Fault Countermeasure Providing Data and Program Flow Integrity

Medwed, M. & Schmidt, J-M., 2008, 5th Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2008. IEEE-CS Press, p. 68-73

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

A Generic Framework for Impossibility Results in Time-Varying Graphs

Braud-Santoni, N., Dubois, S., Kaaouachi, M-H. & Petit, F., 2015, IEEE International Symposium on Parallel & Distributed Processing, Workshops. IEEE Conference Publishing, p. 0-0

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Time-varying
Graph in graph theory
Deterministic Algorithm
Framework