Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output

Hardware Aspects of Elliptic Curve Cryptography

Wolkerstorfer, J., 2004

Research output: ThesisDoctoral ThesisResearch

Hardware Countermeasures Against DPA – A Statistical Analysis of Their Effectiveness

Mangard, S., 2004, Topics in Cryptology - CT-RSA 2004. Springer, Vol. 2964. p. 222-235 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Hardware Crackers

Oswald, M. E. (ed.), Batina, L. (ed.), Pelzl, J. (ed.), Priplata, C. (ed.), Stahlke, C. (ed.) & Francois-Xavier, S. (ed.), 2005, .

Research output: Book/ReportOther reportResearch

Hardware Implementation of a Flexible Tag Platform for Passive RFID Devices

Plos, T. & Feldhofer, M., 2011, Proceedings of the 14th Euromicro Conference on Digital System Design Architectures, Methods and Tools (DSD 2011), Oulu, Finland, August, 2011, Proceedings. IEEE Computer Society, p. 293-300

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Hardware Implementation of Symmetric Algorithms for RFID Security

Feldhofer, M. & Wolkerstorfer, J., 2008, RFID Security: Techniques, Protocols and System-On-Chip Design. 1 ed. New York, NY: Springer, p. 373-415

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

Hardware Implementations of the Round-Two SHA-3 Candidates: Comparison on a Common Ground

Tillich, S., Feldhofer, M., Kirschbaum, M., Plos, T., Schmidt, J-M. & Szekely, A., 2010, Proceedings of Austrochip 2010, Villach, Austria, October 6, 2010, Proceedings. ., p. 43-48

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Hardware-Security Technologies for Industrial IoT: TrustZone and Security Controller

Lesjak, C., Hein, D. & Winter, J., 2015, (Accepted/In press) Industrial Electronics Society, IECON 2015 41st Annual Conference of the IEEE. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Hardware-Software-Codesign of Side-Channel Evaluated Identity-based Encryption

Unterluggauer, T., 2013

Research output: ThesisMaster's ThesisResearch

Open Access
File

Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software

Gallais, J-F., Großschädl, J., Hanley, N., Kasper, M., Medwed, M., Regazzoni, F., Schmidt, J-M., Tillich, S. & Wojcik, M., 2010, Trusted Systems. Second International Conference, INTRUST 2010, Beijing, China, December 13th-15th, 2010. Proceedings. ., p. 253-270

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearch

Harmonizing Delegation Data Formats

Wagner, G., Omolola, O. & More, S. J., 6 Oct 2017, Lecture Notes in Informatics: Open Identity Summit 2017. Bonn: Gesellschaft für Informatik , Vol. 2017.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access

Harnessing Electronic Signatures to Improve the Security of SMS-based Services

Zefferer, T., Tauber, A. & Zwattendorfer, B., 2013, Web Information Systems and Technologies. 1 ed. ., p. 331-346 (Lecture Notes in Business Information Processing).

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

Open Access
File

Health Records and the Cloud Computing Paradigm from a Privacy Perspective

Stingl, C. & Slamanig, D., 2011, In : Journal of healthcare engineering. 2, 4, p. 487-508

Research output: Contribution to journalArticleResearchpeer-review

Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates

Dobraunig, C. E., Eichlseder, M. & Mendel, F., 2015, Advances in Cryptology - ASIACRYPT 2015. Springer, (LNCS; vol. 9453).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

HF/UHF Dual Band RFID Transponders for an Information-Driven Public Transportation System

Zöscher, L., Spreitzer, R., Groß, H., Grosinger, J., Mühlmann, U., Amschl, D., Watzinger, H. & Bösch, W., 11 May 2016, In : e&i - Elektrotechnik und Informationstechnik. 133, 3, p. 163-175

Research output: Contribution to journalArticleResearchpeer-review

Higher-Order Cryptanalysis of LowMC

Dobraunig, C. E., Eichlseder, M. & Mendel, F., 2015, Information Security and Cryptology - ICISC 2015. Springer, p. 87-101 (LNCS; vol. 9558).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Higher-Order Side-Channel Protected Implementations of KECCAK

Groß, H., Schaffenrath, D. & Mangard, S., 2017, DSD. IEEE Computer Society, p. 205-212 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Highly-Efficient Fully-Anonymous Dynamic Group Signatures

Derler, D. & Slamanig, D., 2018, Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security, AsiaCCS 2018. Association of Computing Machinery, p. 551-565

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

High Speed ASIC Implementations of Leakage-Resilient Cryptography

Schilling, R., Unterluggauer, T., Mangard, S., Gürkaynak, F. K., Mühlberghuber, M. & Benini, L., Mar 2018, Design, Automation & Test in Europe Conference - DATE 2018. Institute of Electrical and Electronics Engineers

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

High Speed Elliptic Curve Cryptography Processor for GF(p)

Pühringer, C. & Wolkerstorfer, J., 2005, Austrochip 2005 Mikroelektronik Tagung. ., p. 153-160

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

High-Speed RSA Hardware Based on Barret's Modular Reduction Method

Großschädl, J., 2000, Cryptographic Hardware and Embedded Systems — CHES 2000. Koç, Ç. K. & Paar, C. (eds.). Berlin: Springer Verlag, Vol. 1965. p. 191-203 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

High Speed VLSI Triple-DES-Module

Wolkerstorfer, J., 1999

Research output: ThesisDiploma ThesisResearch

Hochleistungs-ECC mit Standardkomponenten

Bauer, W. & Wolkerstorfer, J., 2003, IT-Sicherheit im verteilten Chaos - Tagungsband des 8. BSI-Kongress für IT-Sicherheit. Ingelheim: SecuMedia Verlag, p. X-X

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation

Derler, D., Ramacher, S. & Slamanig, D., 2017, Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers. Springer Verlag, p. 124-142 (Lecture Notes in Computer Science; vol. 10322).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Horcruxes for Everyone - A Framework for Key-Loss Recovery by Splitting Trust

Hörandner, F. & Rabensteiner, C., 2019, 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE Trustcom-19). Institute of Electrical and Electronics Engineers, p. 50-57

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

How to Handle Assumptions in Synthesis

Bloem, R. P., Ehlers, R., Jacobs, S. & Könighofer, R., 2014, Proceedings 3rd Workshop on Synthesis. Electronic Proceedings in Theoretical Computer Science, Vol. 157. p. 34-50 (EPTCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

How to Preserve Patient's Privacy and Anonymity in Web- based Electronic Health Records (Best student paper award)

Slamanig, D. & Stingl, C., 2009, 2nd International Conference on Health Informatics, HEALTHINF 2009. INSTICC Press, p. 257-264

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Human Computation for Constraint-based Recommenders

Ulz, T., Schwarz, M., Felfernig, A., Haas, S., Shehadeh, A., Reiterer, S. & Stettinger, M., 31 Dec 2016, In : Journal of Intelligent Information Systems. 1, 1, p. 1-21 21 p., 1.

Research output: Contribution to journalArticleResearchpeer-review

Human Motion Flow Analysis

Orthacker, C., 2006

Research output: ThesisMaster's ThesisResearch

Hunting Password Leaks in Android Applications

Feichtner, J., 2018, ICT Systems Security and Privacy Protection. Jan Janczewski, L. & Kutyłowski, M. (eds.). Cham: Springer International Publishing AG , Vol. 529. p. 278-292 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Hybrid Engine for Polymorphic Code Detection

Payer, U., Teufl, P. & Lamberger, M., 2005, Detection of intrusions and malware, and vulnerability assessment. Berlin [u.a.]: Springer, Vol. 3548. p. 19-31 (Lecture notes im computer science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Hybrid Mobile Edge Computing: Unleashing the Full Potential of Edge Computing in Mobile Device Use Cases

Reiter, A., Prünster, B. & Zefferer, T., 2017, Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing. IEEE Press, p. 935-944

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

IAIK/OpenTC Java TPM Tools

Winkler, T., 2006

Research output: Non-print formSoftwareResearch

IAIK/OpenTC Java TSS Wrapper

Winkler, T., 2006

Research output: Non-print formSoftwareResearch

IAIK-CMS with S/MIMEv3 4.01 SDK

Bratko, D., 2007

Research output: Non-print formSoftwareResearch

IAIK-CMS with S/MIMEv3 4.0 SDK

Bratko, D. & Scheibelhofer, K., 2007

Research output: Non-print formSoftwareResearch

IAIK-CMS with S/MIMEv3 4.1 SDK

Bratko, D., 2009

Research output: Non-print formSoftwareResearch

IAIK-CMS with S/MIMEv3 5.0 SDK

Bratko, D., 2013

Research output: Non-print formSoftwareResearch

IAIK-ECC 2.16 SDK

Lamberger, M. & Bratko, D., 2007

Research output: Non-print formSoftwareResearch

IAIK-ECC 2.17 SDK

Lamberger, M. & Bratko, D., 2008

Research output: Non-print formSoftwareResearch

IAIK-ECC 2.18 SDK

Lamberger, M. & Bratko, D., 2008

Research output: Non-print formSoftwareResearch

IAIK-ECC 2.19 SDK

Lamberger, M. & Bratko, D., 2009

Research output: Non-print formSoftwareResearch

IAIK ECCelerate SDK 1.0

Hanser, C., 2011

Research output: Non-print formSoftwareResearch

IAIK ECCelerate SDK 1.01

Hanser, C., 2011

Research output: Non-print formSoftwareResearch

IAIK ECCelerate SDK 1.02

Hanser, C., 2011

Research output: Non-print formSoftwareResearch

IAIK ECCelerate SDK 1.03

Hanser, C., 2011

Research output: Non-print formSoftwareResearch

IAIK ECCelerate SDK 1.0 Beta

Hanser, C., 2011

Research output: Non-print formSoftwareResearch

IAIK ECCelerate SDK 1.0 RC

Hanser, C., 2011

Research output: Non-print formSoftwareResearch

IAIK ECCelerate SDK 1.50

Hanser, C., 2011

Research output: Non-print formSoftwareResearch

IAIK ECCelerate SDK 1.51

Hanser, C., 2012

Research output: Non-print formSoftwareResearch

IAIK ECCelerate SDK 1.60

Hanser, C., 2012

Research output: Non-print formSoftwareResearch