Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output 1983 2019

(Old data) Lecture or Presentation

Aktuelle Entwicklungen bei Hashfunktionen

Illies, G. & Rechberger, C., 14 May 2009.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

Analysis of an anonymous fair exchange e-commerce protocol

Rijmen, V. & Bechlaghem, M., 19 May 2005.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

ARMageddon: How Your Smartphone CPU breaks software-level Security and Privacy

Lipp, M. & Maurice, C. L. N., 2016.

Research output: Contribution to conference(Old data) Lecture or PresentationResearchpeer-review

Smartphones
Program processors
Application programs
Personal computing
Mountings

Austrian Mobile Signing

Lipp, P. & Leitold, H., 25 Jun 2015.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

Biometrics in eID: Challenges and Opportunities

Austria, A-SIT. Z. F. S. I. & Gilbert, J., 8 Sep 2010.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

Blackberry Mobile Data Services

Leitold, H. & Dietrich, K., 15 Nov 2004.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

Building blocks to facilitate electronic communication in various domains: eID and eSignature

Leitold, H. & Soykan, E. U., 7 Nov 2014.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

Coding Schemes for Arithmetic and Logic Operations - How Robust Are They?

Plos, T. & Medwed, M., 25 Aug 2009.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

Debugging Unrealizable Specifications Using Simple Counterstrategies

Könighofer, R., Hofferek, G. & Bloem, R. P., 28 Jun 2009.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

eGovernment-modules for creating and verifying digital signatures

Scheibelhofer, K., Bauer, W. & Lipp, P., 20 May 2003.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

Encoding of Security Functionality in ISO18000-6C

Feldhofer, M., Plos, T. & Aigner, M. J., 8 Apr 2008.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

ETISS 2009 - Mobile Lab

Dietrich, K., Winter, J. & Eckberg, J-E., 2009.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

Instruction Set Extensions for Cryptography

Tillich, S. & Johann, G., 28 May 2008.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

Integrating Cryptographic Security to the EPC Gen2 Standard

Plos, T. & Aigner, M. J., 6 Mar 2008.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

Linux powered Trusted Computing

Pirker, M. & Winkler, T., 20 May 2006.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

Linux Powered Trusted Computing

Winkler, T. & Pirker, M., 2 Jun 2006.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

Mobile qualifizierte elektronische Signatur: technisches Konzept und rechtliche Bewertung

Rössler, T. & Kustor, P., 26 Feb 2010.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

Model-Based MCDC Testing of Complex Decisions for the Java Card Applet Firewall

Bloem, R. P., Greimel, K., Könighofer, R. & Röck, F., 28 Oct 2013.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

Open Access
File

Nacl on 8-bit AVR Microcontrollers

Hutter, M. & Schwabe, P., 24 Jun 2013.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

PKI Developments in Europe

Rijmen, V. & De Cock, D., 19 Nov 2009.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

Plateau Characteristics

Daemen, J. & Rijmen, V., 8 Jan 2007.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

Pure Java Server Signature Modules

Lipp, P. & Scheibelhofer, K., 8 Dec 2003.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

Representations and Rijndael descriptions

Rijmen, V. & Oswald, M. E., 10 May 2004.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

Specification Format for Reactive Synthesis Problems

Khalimov, A., 2015.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

Statistics of correlation and differentials in block ciphers

Daemen, J. & Rijmen, V., 4 Jan 2006.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

STORK Project Presentation

Leitold, H. & Pregartbauer, M., 13 Mar 2009.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

Open Access
File

What could possibly go wrong with <insert x86 instruction here>?

Maurice, C. L. N. & Lipp, M., 2016.

Research output: Contribution to conference(Old data) Lecture or PresentationResearchpeer-review

Hardware
Data storage equipment
Virtual addresses
Physical addresses
Program processors
Abstract

Analysis of the influence of deviations between training and test data in learned image reconstruction

Knoll, F., Hammernik, K., Kobler, E., Pock, T., Sodickson, D. K. & Recht, M. P., 2018.

Research output: Contribution to conferenceAbstractResearchpeer-review

Assessment of the generalization of learned image reconstruction and the potential for transfer learning

Knoll, F., Hammernik, K., Pock, T., Sodickson, D. K. & Recht, M. P., 2018, p. 3376.

Research output: Contribution to conferenceAbstractResearchpeer-review

Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order

Groß, H., Mangard, S. & Korak, T., 24 Oct 2016, p. 3. 3 p.

Research output: Contribution to conferenceAbstractResearchpeer-review

Cryptography
Hardware
Computer hardware
Digital circuits
Embedded systems

Variational Adversarial Networks for Accelerated MR Image Reconstruction

Hammernik, K., Kobler, E., Pock, T., Recht, M. P., Sodickson, D. K. & Knoll, F., 2018, p. 1091.

Research output: Contribution to conferenceAbstractResearchpeer-review

Anthology

Austrochip 2007: Proceedings of the 15th Austrian Workshop on Microelectronics

Wolkerstorfer, J. (ed.) & Posch, K-C. (ed.), 2007, 1 ed. Graz: Verlag der Technischen Universität Graz. 179 p.

Research output: Book/ReportAnthologyResearch

Information Security - 11th International Conference ISC 2008

Rijmen, V. (ed.), 2008, Springer.

Research output: Book/ReportAnthologyResearch

Report of the February 2009 XAdES / CAdES Remote Plugtest

Lanz, K. (ed.), 2009, .

Research output: Book/ReportAnthologyResearch

Security and Privacy Issues 9th International Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected Papers.

Hutter, M. (ed.) & Schmidt, J-M. (ed.), 2013, Berlin Heidelberg: Springer.

Research output: Book/ReportAnthologyResearch

Workshop on RFID Security 2008 - Proceedings

Dominikus, S. (ed.), 2008, .

Research output: Book/ReportAnthologyResearch

Workshop on RFID Security - Proceedings

Dominikus, S. (ed.), 2006, .

Research output: Book/ReportAnthologyResearch

Article

AES Implementation on a Grain of Sand

Feldhofer, M., Wolkerstorfer, J. & Rijmen, V., 2005, In : IEE proceedings / information security. 152, 1, p. 13-20

Research output: Contribution to journalArticleResearchpeer-review

A Federation of Federations: Secure Cloud Federations meet European Identity Federations

Zefferer, T., Ziegler, D. & Reiter, A., Mar 2018, In : International Journal for Information Security Research. Volume 8, Issue 1

Research output: Contribution to journalArticleResearchpeer-review

Agent-Based Cloud Resource Management for Secure Cloud Infrastructures

Balogh, Z., Gatial, E., Hluchý, L., Tögl, R., Pirker, M. & Hein, D., 2014, In : Computing and informatics. 33, 6, p. 1333-1355

Research output: Contribution to journalArticleResearchpeer-review

A Highly Regular and Scalable AES Hardware Architecture

Mangard, S., Aigner, M. & Dominikus, S., 2003, In : IEEE transactions on computers. 52, 4, p. 483-491

Research output: Contribution to journalArticleResearchpeer-review

A hijacker’s guide to communication interfaces of the trusted platform module

Winter, J. & Dietrich, K., 2013, In : Computers & mathematics with applications. 65, 5, p. 748-761

Research output: Contribution to journalArticleResearchpeer-review

Analysis of the Hash Function Design Strategy called SMASH

Lamberger, M., Pramstaller, N., Rechberger, C. & Rijmen, V., 2008, In : IEEE transactions on information theory. 54, 8, p. 3647-3655

Research output: Contribution to journalArticleResearchpeer-review

An Approach to Introducing Locality in Remote Attestation using Near Field Communications

Tögl, R. & Hutter, M., 2011, In : The journal of supercomputing. 55, 2, p. 207-227

Research output: Contribution to journalArticleResearchpeer-review

An Autonomous Attestation Token to Secure Mobile Agents in Disaster Response

Hein, D., Tögl, R. & Kraxberger, S., 2010, In : Security and communication networks. 3, 5, p. 421-438

Research output: Contribution to journalArticleResearchpeer-review

A New Architecture for Developing Cryptographic Cloud Services

Lorünser, T., Slamanig, D., Länger, T. & Pöhls, H. C., 1 Jun 2016, In : ERCIM news. 106

Research output: Contribution to journalArticleResearch

An Interoperability Standard for Certified Mail Systems

Tauber, A., Apitzsch, J. & Boldrin, L., 2012, In : Computer standards & interfaces. 34, 5, p. 452-466

Research output: Contribution to journalArticleResearchpeer-review

Approaching the Challenge of eID Interoperability: An Austrian Perspective

Tauber, A., Zefferer, T. & Zwattendorfer, B., 2012, In : European Journal of ePractice. 14, p. 22-39

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

Architectural Enhancements to Support Digital Signal Processing and Public-Key Cryptography

Großschädl, J., Tillich, S. & Posch, K-C., 2004, In : Telematik. 10, 3-4, p. 36-42

Research output: Contribution to journalArticleResearch

Architectural Support for Long Integer Modulo Arithmetic on RISC-Based Smart Cards

Großschädl, J., 2003, In : The international journal of high performance computing applications. 17, 2, p. 135-146

Research output: Contribution to journalArticleResearchpeer-review