Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output 1983 2019

2016

Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability

Blazy, O., Derler, D., Slamanig, D. & Spreitzer, R., 2016, Topics in Cryptology - CT-RSA 2016 - The Cryptographer's Track at the RSA Conference 2016, San Francisco, CA, USA, 2016. Proceedings.. LNCS ed. Springer Verlag, Vol. 9610. p. 127-143

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Hash functions

Opportunities and Challenges of CREDENTIAL - Towards a Metadata-Privacy Respecting Identity Provider

Karegar, F., Striecks, C., Krenn, S., Hörandner, F., Lorünser, T. & Fischer-Hübner, S., 2016, Privacy and Identity Management. Facing up to Next Steps - 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papers. p. 76-91 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Pattern-oriented approaches for design-based research in collaborative research projects: a knowledge maturing perspective

Kunzmann, C., Schmidt, A. & Pirker, J., 2016, Proceedings of the 21st European Conference on Pattern Languages of Programs. p. 19 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Practical Key Recovery Attack on MANTIS-5

Dobraunig, C. E., Eichlseder, M., Kales, D. & Mendel, F., 2016, In : IACR Transactions on Symmetric Cryptology. 2016, 2

Research output: Contribution to journalArticleResearchpeer-review

Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE

Grassi, L. & Rechberger, C., 2016, Progress in Cryptology -- INDOCRYPT 2016: 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings. Dunkelman, O. & Sanadhya, S. K. (eds.). Cham: Springer International Publishing AG , p. 322-342 21 p.

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions

Fuchsbauer, G., Hanser, C., Kamath, C. & Slamanig, D., 1 Jun 2016, 10th Conference on Security and Cryptography for Networks. Springer Verlag

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Preface

Arbel, E. & Bloem, R., 2016, In : Lecture notes in computer science. 10028 LNCS, p. V-VI

Research output: Contribution to journalEditorialResearchpeer-review

Prefetch Side-Channel Attacks: Bypassing SMAP and kernel ASLR

Gruss, D., Maurice, C., Fogh, A., Lipp, M. & Mangard, S., 24 Oct 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association of Computing Machinery, Vol. 24-28-October-2016. p. 368-379 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Virtual addresses
Physical addresses
Binary codes
Flow control
Program processors

PRISMACLOUD D5.8 Overview of Verifiable Computing Techniques Providing Private and Public Verification

Buchmann, J., Demirel, D., Derler, D., Schabhüser, L. & Slamanig, D., 1 Feb 2016, .

Research output: Book/ReportOther reportResearch

Open Access
File

PRISMACLOUD – Privacy and Security Maintaining Services in the Cloud

Slamanig, D., Karyda, A. & Lorünser, T., 2016, In : ERCIM news. 104, p. 46-46

Research output: Contribution to journalArticleResearch

PRISMACLOUD Tools: A Cryptographic Toolbox for Increasing Security in Cloud Services

Lorünser, T., Slamanig, D., Länger, T. & Pöhls, H. C., 2016, 11th International Conference on Availability, Reliability and Security, Workshop on Security, Privacy, and Identity Management in the Cloud (ARES SECPID 2016). Institute of Electrical and Electronics Engineers, p. 733-741 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access

Protecting the Control Flow of Embedded Processors against Fault Attacks

Werner, M., Wenger, E. & Mangard, S., Mar 2016, Smart Card Research and Advanced Applications: 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers. Homma, N. & Medwed, M. (eds.). Springer, Vol. 9514.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Flow control
Side channel attack
Microprocessor chips
Hardware

Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript

Gruss, D., Maurice, C. & Mangard, S., 1 Jul 2016, Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). Springer Vieweg, (DIMVA).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Secure and Privacy-Preserving Identity Management in the Cloud

Zwattendorfer, B., Krenn, S. & Lorünser, T., 2016, In : ERCIM news. 104, p. 44-45

Research output: Contribution to journalArticleResearch

Secure I/O with Intel SGX

Weiser, S., 2016

Research output: ThesisMaster's ThesisResearch

Open Access
File
Mobile devices
Laptop computers
Mobile phones
Application programs
Personal computers

Securing Integration of Cloud Services in Cross-Domain Distributed Environments

Suzic, B., 2016, Proceedings of the 31st Annual ACM Symposium on Applied Computing. New York, NY, USA: Association of Computing Machinery, p. 398-405 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Industry
Chemical analysis

Signatures for Privacy, Trust and Accountability in the Cloud: Applications and Requirements

Alaqra, A., Fischer-Hübner, S., Groß, T., Lorünser, T. & Slamanig, D., 1 Jul 2016, Privacy and Identity Management. Time for a Revolution?. AICT ed. Springer Verlag, Vol. 476.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Signatures on Equivalence Classes: A New Tool for Privacy-Enhancing Cryptography

Hanser, C., Feb 2016, 191 p.

Research output: ThesisDoctoral ThesisResearch

Equivalence classes
Cryptography
Data privacy
Electronic document identification systems
Communication

Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing

Derler, D., Krenn, S. & Slamanig, D., 31 Oct 2016.

Research output: Contribution to conferencePaperResearchpeer-review

Square Attack on 7-Round Kiasu-BC

Dobraunig, C. E., Eichlseder, M. & Mendel, F., 2016, ACNS 2016. Manulis, M. & Sadeghi, A-R. (eds.). Springer, (LNCS; vol. 9696).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes

Dobraunig, C. E., Eichlseder, M., Korak, T., Lomné, V. & Mendel, F., 2016, Advances in Cryptology - ASIACRYPT 2016. Cheon, J. H. & Takagi, T. (eds.). Springer, Vol. 1. p. 369-395 (Lecture Notes in Computer Science; vol. 10031).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access

Subspace Trail Cryptanalysis and its Applications to AES

Grassi, L., Rechberger, C. & Rønjom, S., 2016, FSE 2017 - 24th International Conference on Fast Software Encryption. Vol. 2016. p. 592 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Synthesis of self-stabilising and byzantine-resilient distributed systems

Braud-Santoni, N., Jacobs, S. & Bloem, R., 2016, Computer Aided Verification - 28th International Conference, CAV 2016, Proceedings. Springer-Verlag Italia, Vol. 9779. p. 157-176 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9779).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Distributed Systems
Synthesis
Distributed Algorithms
Fault-tolerant
Parallel algorithms

Synthesis of Self-Stabilizing and Byzantine-Resilient Distributed Systems

Braud-Santoni, N., Bloem, R. & Jacobs, S., 17 Jun 2016.

Research output: Contribution to conferencePaperResearchpeer-review

Open Access
File
Parallel algorithms
Stabilization
Temporal logic
Specifications
Formal specification

Synthesizing Adaptive Test Strategies from Temporal Logic Specifications

Bloem, R., Könighofer, R., Pill, I. H. & Röck, F., 2016, p. 17-24. 8 p.

Research output: Contribution to conferencePaperResearchpeer-review

Temporal logic
Specifications
Testing

The Austrian eID ecosystem in the public cloud: How to obtain privacy while preserving practicality

Zwattendorfer, B. & Slamanig, D., 2016, In : Journal of information security and applications. 27-28

Research output: Contribution to journalArticleResearchpeer-review

The first reactive synthesis competition (SYNTCOMP 2014)

Jacobs, S., Bloem, R., Brenguier, R., Ehlers, R., Hell, T., Könighofer, R., Pérez, G. A., Raskin, J. F., Ryzhyk, L., Sankur, O., Seidl, M., Tentrup, L. & Walker, A., 9 Apr 2016, In : International journal on software tools for technology transfer. p. 1-24 24 p.

Research output: Contribution to journalArticleResearchpeer-review

Specifications
Controllers

The Next 700 Impossibility Results in Time-Varying Graphs

Braud-Santoni, N., Dubois, S., Kaaouachi, M-H. & Petit, F., Jan 2016, In : International Journal of Networking and Computing. p. 27-41 1.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

The second reactive synthesis competition (SYNTCOMP 2015)

Jacobs, S., Bloem, R., Brenguier, R., Pérez, G. A., Raskin, J. F., Ryzhyk, L., Sankur, O., Seidl, M., Tentrup, L., Walker, A. & Könighofer, R., 2 Feb 2016, In : Electronic Proceedings in Theoretical Computer Science. 202, p. 27-57 31 p.

Research output: Contribution to journalArticleResearchpeer-review

Tight Cutoffs for Guarded Systems with Fairness

Khalimov, A., Jacobs, S. & Außerlechner, S., 2016, International Conference on Verification, Model Checking, and Abstract Interpretation. ., p. 1-20

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Towards a Personal Security Device

Rath, C., Niedermair, T. & Zefferer, T., 2016, Security and Trust Management. Springer, Vol. 9871 LNCS. p. 1-16 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9871 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Towards Authenticity and Privacy Preserving Accountable Workflows

Derler, D., Hanser, C., Pöhls, H. C. & Slamanig, D., 1 Jul 2016, Privacy and Identity Management. Time for a Revolution?. AICT ed. Springer Verlag, Vol. 476.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Towards Privacy-preserving Attribute Aggregation in Federated eID Systems

Priesnitz Filho, W., Ribeiro, C. & Zefferer, T., 2016, CAiSE Forum 2016: Proceedings of the CAiSE'16 Forum, at the 28th International Conference on Advanced Information Systems Engineering (CAiSE 2016). CEUR-WS.org, p. 97-104 (CEUR Workshop Proceedings; vol. 1612).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Towards Secure Collaboration in Federated Cloud Environments

Suzic, B. & Reiter, A., 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES). Institute of Electrical and Electronics Engineers, p. 750-759 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Public administration
Security of data
Data privacy
Electronic data interchange
Cloud computing

Towards Secure Integration and Interoperability in Heterogeneous Environments

Suzic, B., Sep 2016, 53 p.

Research output: Other contributionResearch

Open Access
File

Usable Privacy-aware Logging for Unstructured Log Entries

Rath, C., 31 Aug 2016, Availability, Reliability and Security (ARES 2016). CPS, IEEE Xplore, 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Usable Privacy-aware Logging for Unstructured Log Entries

Rath, C., 31 Aug 2016.

Research output: Contribution to conferencePaperResearchpeer-review

User-centered Security Management of API-based Data Integration Workflows

Suzic, B., 2016, 2016 IEEE/IFIP Network Operations and Management Symposium (NOMS). Institute of Electrical and Electronics Engineers, p. 1233-1238 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Data integration
Application programming interfaces (API)
Outsourcing
Industry
Network protocols

What could possibly go wrong with <insert x86 instruction here>?

Maurice, C. L. N. & Lipp, M., 2016.

Research output: Contribution to conference(Old data) Lecture or PresentationResearchpeer-review

Hardware
Data storage equipment
Virtual addresses
Physical addresses
Program processors
2015

A browser-based JavaScript Solution for easy Smart Card-Access to European eIDs

Lenz, T., Zwattendorfer, B. & Hutzler, A., 2015, (Accepted/In press) Central and Eastern European eGov Days. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

A General Framework for Redactable Signatures and New Constructions

Derler, D., Pöhls, H., Samelin, K. & Slamanig, D., 2015, 18th Annual International Conference on Information Security and Cryptology, ICISC 2015, November 25-27, Seoul, Korea.. LNCS ed. Springer Verlag, Vol. 9558 .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

A Generic Framework for Impossibility Results in Time-Varying Graphs

Braud-Santoni, N., Dubois, S., Kaaouachi, M-H. & Petit, F., 2015, IEEE International Symposium on Parallel & Distributed Processing, Workshops. IEEE Conference Publishing, p. 0-0

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Time-varying
Graph in graph theory
Deterministic Algorithm
Framework

A Modular and Flexible Attribute Mapping Service to Meet National Requirements in Cross-Border eID Federations

Lenz, T., 2015, 13th International Conference on e-Society 2015. ., p. 207-214

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

A modular and flexible identity management architecture for national eID solutions

Lenz, T. & Zwattendorfer, B., 2015, International Conference on Web Information Systems and Technologies. ., p. 321-331

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Analysis of SHA-512/224 and SHA-512/256

Dobraunig, C. E., Eichlseder, M. & Mendel, F., 2015, Advances in Cryptology - ASIACRYPT 2015. Springer, Vol. 9453. p. 612-630 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

A New Approach To Efficient Revocable Attribute-Based Anonymous Credentials

Derler, D., Hanser, C. & Slamanig, D., 2015, Cryptography and Coding - IMACC 2015 - 15th IMA International Conference on Cryptography and Coding. LNCS ed. Springer Verlag, Vol. 9496 .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

ARCHISTAR: Towards Secure and Robust Cloud Based Data Sharing

Lorünser, T., Happe, A. & Slamanig, D., 2015, IEEE 7th International Conference on Cloud Computing Technology and Science, CloudCom 2015, Vancouver, 30.11-03.12 2015. Institute of Electrical and Electronics Engineers

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Assume-Guarantee Synthesis for Concurrent Reactive Programs with Partial Information

Bloem, R. P., Chatterjee, K., Jacobs, S. & Könighofer, R., 2015, Tools and Algorithms for the Construction and Analysis of Systems (TACAS) - 21st International Conference. Berlin Heidelberg: Springer, Vol. 9035. p. 517-532 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Attribute-based Encryption goes X.509

Reimair, F. & Feichtner, J., 2015, Proceedings of the International Conference on e-Business Engineering (ICEBE). ., p. 393-400

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Austrian Mobile Signing

Lipp, P. & Leitold, H., 25 Jun 2015.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch