Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output 1983 2019

2015

Blank Digital Signatures: Optimization and Practical Experiences

Derler, D., Hanser, C. & Slamanig, D., 2015, Privacy and Identity Management for the Future Internet in the Age of Globalisation. ., Vol. 457. p. 1-15 (IFIP AICT).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches

Gruss, D., Spreitzer, R. & Mangard, S., 2015, 24th USENIX Security Symposium, Washington, D.C., USA, August 12-14, 2015. USENIX Association, p. 897-912

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
User interfaces
Program processors
Information systems
Entropy
Processing

Case Study: Automatic Test Case Generation for a Secure Cache Implementation

Bloem, R. P., Hein, D., Röck, F. & Schumi, R. A., 2015, (Accepted/In press) International Conference on Tests And Proofs. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Challenges emerging from future cloud application scenarios

Jeferry, K., Kousiouris, G., Kyriazis, D., Altmann, J., Ciuffoletti, A., Maglogiannis, I., Nesi, P., Suzic, B. & Zhao, Z., 2015, Procedia Computer Science: 1st International Conference on Cloud Forward: From Distributed to Complete Computing. Elsevier B.V., Vol. 68. p. 227 - 237

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Cloud computing
Interoperability

Cloud Security and Privacy by Design

Lorünser, T., Länger, T. & Slamanig, D., 2015, 6th International Conference on E-Democracy (E-Democracy 2015). CCIS ed. Springer Verlag, Vol. 570 . p. 202-206

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Concept for a Security Aware Automatic Fare Collection System Using HF/UHF Dual Band RFID Transponders

Zöscher, L., Grosinger, J., Spreitzer, R. C., Muehlmann, U., Groß, H. & Bösch, W., 2015, 2015 45th European Solid State Device Reserach Conference. ., p. 194-197

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Cooperative Reactive Synthesis

Bloem, R., Ehlers, R. & Könighofer, R., 2015, Automated Technology for Verification and Analysis (ATVA'15). Berlin-Heidelberg: Springer, Vol. 9364. p. 394-410 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Cryptanalysis of Ascon

Dobraunig, C. E., Eichlseder, M., Mendel, F. & Schläffer, M., 2015, Topics in Cryptology - CT-RSA 2015. Springer, (LNCS; vol. 9048).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Decidability of Parameterized Verification

Khalimov, A., Bloem, R., Veith, H., Widder, J., Konnov, I., Rubin, S. & Jacobs, S., 2015, 1 ed. .

Research output: Book/ReportBookResearch

Demiurge 1.2.0: A SAT-Based Synthesis Tool

Könighofer, R. & Seidl, M., 2015, .

Research output: Book/ReportOther reportResearch

Open Access
File

Design Strategies for a Privacy-Friendly Austrian eID System in the Public Cloud

Zwattendorfer, B. & Slamanig, D., 1 Dec 2015, In : Computers & Security.

Research output: Contribution to journalArticleResearchpeer-review

e-ID in the Cloud with SCIM

Suzic, B., 2015, Zentrum für sichere Informationstechnologie - Austria. 41 p.

Research output: Book/ReportCommissioned reportResearch

File

Enabling Secure Communication Over Existing Peer-to-Peer Frameworks

Reiter, A., 2015, (Accepted/In press) 23rd Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP2015). .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Encryption-based Second Authentication Factor Solutions for Qualified Server-side Signature Creation

Rath, C., Roth, S., Bratko, H. & Zefferer, T., 2015, Electronic Government and the Information Systems Perspective. Springer, Vol. 9265. p. 71-85 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Forgery Attacks on round-reduced ICEPOLE-128

Dobraunig, C. E., Eichlseder, M. & Mendel, F., 2015, Selected Areas in Cryptography. Springer, p. 479-492 (LNCS; vol. 9566).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Fortgeschrittene PDF Signaturen mit PAdES

Fitzek, A. G., Maierhofer, C., Tauber, A. & Zwattendorfer, B., 2015, In : eGovernment review. 15, p. 16-17

Research output: Contribution to journalArticleResearch

Open Access
File

Hardware-Security Technologies for Industrial IoT: TrustZone and Security Controller

Lesjak, C., Hein, D. & Winter, J., 2015, (Accepted/In press) Industrial Electronics Society, IECON 2015 41st Annual Conference of the IEEE. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates

Dobraunig, C. E., Eichlseder, M. & Mendel, F., 2015, Advances in Cryptology - ASIACRYPT 2015. Springer, (LNCS; vol. 9453).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Higher-Order Cryptanalysis of LowMC

Dobraunig, C. E., Eichlseder, M. & Mendel, F., 2015, Information Security and Cryptology - ICISC 2015. Springer, p. 87-101 (LNCS; vol. 9558).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

IAIK ECCelerate SDK 3.0

Hanser, C. & Ramacher, S., 2015

Research output: Non-print formSoftwareResearch

IAIK ECCelerate SDK 3.01

Hanser, C. & Ramacher, S., 2015

Research output: Non-print formSoftwareResearch

In Certificates We Trust - Revisited

Reimair, F., Teufl, P. & Prünster, B., 2015, Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. ., p. 702-709

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Java Privacy Guard - The OpenPGP Message Format and an Implementation in Java

More, S. J., 2015

Research output: ThesisBachelor's ThesisResearch

Internet
Cryptography
Electronic document identification systems
Communication

Leveraging the Adoption of Mobile eID and e-Signature Solutions in Europe

Zefferer, T. & Teufl, P., 2015, Electronic Government and the Information Systems Perspective. Springer, p. 86-100

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

MATTHEW D7.2 Updated Plan and Initial Report on Dissemination and Exploitation

Bock, H., Deutschmann, M., Dietrich, C., Hanser, C., Havlik, J., Moschitz, S. & Wenger, E., 2015, .

Research output: Book/ReportOther reportResearch

MoCrySIL - Carry Your Cryptographic Keys in Your Pocket

Reimair, F., Teufl, P., Kollmann, C. & Thaller, C., 2015, 12th International Conference on Security and Cryptography. ., p. 285-292

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

On the Feasibility of (Practical) Commercial Anonymous Cloud Storage

Pulls, T. & Slamanig, D., 2015, In : Transactions on data privacy. 8, 2, p. 89-111

Research output: Contribution to journalArticleResearch

Open Access
File

PaaSPort – A unified PaaS-Cloud Management Application avoiding Vendor Lock-In

Zwattendorfer, B., Suzic, B. & Schanner, G., 2015, Proceedings of the 13th International Conference e-Society 2015. IADIS Press, p. 223-230

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Paving the Way for Security in Cloud-Based Mobile Augmentation Systems

Reiter, A. & Zefferer, T., 2015, 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (IEEE Mobile Cloud 2015). Institute of Electrical and Electronics Engineers, p. 89-98

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

POWER: A Cloud-based Mobile Augmentation Approach for Web- and Cross-Platform Applications

Reiter, A. & Zefferer, T., 2015, (Accepted/In press) Cloud Networking. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Practical Round-Optimal Blind Signatures in the Standard Model

Fuchsbauer, G., Hanser, C. & Slamanig, D., 2015, Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA. Springer Verlag, Vol. 9216. p. 127-144 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

PRISMACLOUD D4.4: Overview of Functional and Malleable Signature Schemes

Demirel, D., Derler, D., Hanser, C., Pöhls, H., Slamanig, D. & Traverso, G., 2015, .

Research output: Book/ReportOther reportResearch

Open Access
File

Privacy-Aware Authentication in the Internet of Things

Groß, H., Hölbl, M., Slamanig, D. & Spreitzer, R., 2015, 14th International Conference on Cryptology and Network Security (CANS 2015) . LNCS ed. Springer Verlag, Vol. 9476. p. 32-39 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Authentication
Internet protocols
Radio frequency identification (RFID)
Network protocols
Internet

Related-Key Forgeries for Proest-OTR

Dobraunig, C. E., Eichlseder, M. & Mendel, F., 2015, Fast Software Encryption. Springer, p. 282-296 (LNCS; vol. 9054).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes

Derler, D. & Slamanig, D., 2015, Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015. Proceedings.. LNCS ed. Springer Verlag, Vol. 9451 . p. 455-474

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives

Derler, D., Hanser, C. & Slamanig, D., 2015, Topics in Cryptology - CT-RSA 2015 - The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings. LNCS ed. Springer Verlag, Vol. 9048. p. 127-144 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Satisfiability-Based Methods for Controller Synthesis

Könighofer, R., 2015

Research output: ThesisDoctoral ThesisResearch

Open Access
File

Secure Block Device - Secure, Flexible, and Efficient Data Storage for ARM TrustZone Systems

Hein, D., Winter, J. & Fitzek, A. G., 2015, (Accepted/In press) The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15). .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Secure Data Sharing and Processing in Heterogeneous Clouds

Suzic, B., Reiter, A., Reimair, F., Venturi, D. & Kubo, B., 2015, Procedia Computer Science: 1st International Conference on Cloud Forward: From Distributed to Complete Computing Secure Data Sharing and Processing in Heterogeneous Clouds. Elsevier B.V., Vol. 68.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Cloud computing
Processing
Access control
Interoperability
Transparency

Securing Smart Maintenance Services: Hardware-Security and TLS for MQTT

Lesjak, C., Hein, D., Hofmann, M., Maritsch, M., Aldrian, A., Priller, P., Ebner, T., Ruprechter, T. & Pregartner, G., 2015, (Accepted/In press) Industrial Informatics (INDIN), 2015 13th IEEE International Conference on. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Sharing is Caring—On the Protection of Arithmetic Logic Units against Passive Physical Attacks

Groß, H., 2015, (Accepted/In press) Workshop on RFID Security - RFIDsec 2015, 11th Workshop, New York, USA, June 22 - 23, 2014, Proceedings.. Springer, (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Shield Synthesis: - Runtime Enforcement for Reactive Systems

Bloem, R. P., Könighofer, B., Könighofer, R. & Wang, C., 2015, Tools and Algorithms for the Construction and Analysis of Systems (TACAS) - 21st International Conference. Berlin Heidelberg: Springer, Vol. 9035. p. 533-548 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Simulations of Optical Emissions for Attacking AES and Masked AES

Grassi, L., Bertoni, G. M. & Melzani, F., 2015, Simulations of Optical Emissions for Attacking AES and Masked AES. ., Vol. 9354. p. 172-189

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Specification Format for Reactive Synthesis Problems

Khalimov, A., 2015.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

STORK 2.0 - D4.10 Final version of Technical Design

WP4 Team, Oct 2015, STORK 2.0 Consortium.

Research output: Book/ReportCommissioned reportResearch

Open Access
File

STORK 2.0 - D4.12 Final version of security recommendations

WP4 Team, Oct 2015, STORK 2.0 Consortium.

Research output: Book/ReportCommissioned reportResearch

Open Access
File

STORK 2.0 - D4.13 Final Version of Common Building Blocks

WP4 Team, 2015, STORK 2.0 Consortium.

Research output: Book/ReportCommissioned reportResearch

Open Access
File

STORK 2.0 - D5.3.5 eGov4Business Pilot Final Report

eGovernment4Business WG, Nov 2015, STORK 2.0 Consortium.

Research output: Book/ReportCommissioned reportResearch

Open Access
File

Suit up! Made-to-Measure Hardware Implementations of ASCON

Groß, H., Wenger, E., Dobraunig, C. E. & Ehrenhöfer, C., 2015, (Accepted/In press) 18th Euromicro Conference on Digital Systems Design. Los Alamitos: IEEE Computer Society

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

SUNFISH D2.1 – State of the Art and Legal Aspects

Reiter, A., Leitold, H., Suzic, B., Reimair, F., Moffie, M., Cordina, D., Pullonen, P., Pettai, M., Kubo, B. & Venturi, D., 30 Dec 2015, (Submitted)

Research output: Other contributionResearch