Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output 1983 2019

2015

SUNFISH D2.2 – Requirement Definition and Threat Model

Reiter, A., Suzic, B., Leitold, H., Cassar, J., Nicoletti, L., Rozenberg, B. & Jones, C., 31 Dec 2015, (Submitted)

Research output: Other contributionResearch

SUNFISH D4.1 – Data Security Policy and SLA definition language

Reiter, A., Suzic, B., Moffie, M. & Cassar, J., 31 Dec 2015, (Submitted)

Research output: Other contributionResearch

SUNFISH D4.4 – Information Sharing Governance Model

Reiter, A., Suzic, B., Reimair, F. & Moffie, M., 31 Dec 2015, (Submitted)

Research output: Other contributionResearch

Synthesizing cooperative reactive mission plans

Ehlers, R., Könighofer, R. & Bloem, R., 2015, International Conference on Intelligent Robots and Systems (IROS'15). Institute of Electrical and Electronics Engineers, p. 3478-3485

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

The ANDIX Research OS - ARM TrustZone Meets Industrial Control Systems Security

Fitzek, A. G., Winter, J., Achleitner, F. & Hein, D., 2015, (Accepted/In press) 2015 IEEE International Conference on Industrial Informatics (INDIN 2015). .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

The Rebound Attack and Subspace Distinguishers: Application to Whirlpool

Lamberger, M., Mendel, F., Rechberger, C., Rijmen, V. & Schläffer, M., 2015, In : Journal of cryptology. 28, 2, p. 257-296 40 p.

Research output: Contribution to journalArticleResearchpeer-review

Towards a New Generation of Mobile Government

Zefferer, T., 2015, 13th International Conference on e-Society 2015. ., p. 191-198

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Towards a New Paradigm for Privacy and Security in Cloud Services

Lorünser, T., Bastos, C., Demirel, D., Fischer-Hübner, S., Groß, T., Länger, T., des Noes, M., Pöhls, H., Rozenberg, B. & Slamanig, D., 2015, 4th Cyber Security and Privacy EU Forum, CSP Forum 2015, Revised Selected Papers. CCIS ed. Springer Verlag, Vol. 530 . p. 14-25

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Towards Evaluating DPA Countermeasures for Keccak on a Real ASIC

Muehlberghuber, M., Korak, T., Hutter, M. & Dunst, P., 2015, (Accepted/In press) Constructive Side-Channel Analysis and Secure Design, The sixth International Workshop on. Springer

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security

Dobraunig, C. E., Koeune, F., Mangard, S., Mendel, F. & Standaert, F-X., 2015, CARDIS. Springer, p. 225-241 (LNCS; vol. 9514).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Towards Transactional Electronic Services on Mobile End-User Devices - A Sustainable Architecture for Mobile Signature Solutions

Zefferer, T., 2015, 11th International Conference on Web Information Systems and Technologies. ., p. 586-597

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Using Anonymous Credentials for eID Authentication in the Public Cloud

Zwattendorfer, B., 2015, 11th International Conference on Web Information Systems and Technologies. ., p. 156-163

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Verifiably Encrypted Signatures: Security Revisited and a New Construction

Hanser, C., Rabkin, M. & Schröder, D., 2015, Computer Security - ESORICS 2015, 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015. Proceedings, Part I. Springer, Vol. 9326. p. 146-164 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

WebCrySIL - Web Cryptographic Service Interoperability Layer

Reimair, F., Teufl, P. & Zefferer, T., 2015, 11th International Conference on Web Information Systems and Technologies. ., p. 35-44

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
2014

A Comparative Survey of Cloud Identity Management-Models

Zwattendorfer, B., Zefferer, T. & Stranacher, K., 2014, Web Information Systems and Technologies 2014. 1 ed. Springer, p. 128-144

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

Adding Controllable Linkability to Pairing-Based Group Signatures For Free

Slamanig, D., Spreitzer, R. C. & Unterluggauer, T., 2014, 17th International Conference on Information Security, ISC 2014. LNCS ed. Springer Verlag, Vol. 8783. p. 388-400

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Cryptography
Costs

A Federated Cloud Identity Broker-Model for Enhanced Privacy via Proxy Re-Encryption

Zwattendorfer, B., Slamanig, D., Stranacher, K. & Hörandner, F., 2014, 15th IFIP TC6/TC11 International Conference on Communications and Multimedia Security, CMS'2014, September 25th - 26th, 2014, Aveiro, Portugal. LNCS ed. Springer Verlag, Vol. 8735 . p. 92-103

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Agent-Based Cloud Resource Management for Secure Cloud Infrastructures

Balogh, Z., Gatial, E., Hluchý, L., Tögl, R., Pirker, M. & Hein, D., 2014, In : Computing and informatics. 33, 6, p. 1333-1355

Research output: Contribution to journalArticleResearchpeer-review

A Low-area ASIC Implementation of AEGIS128, a Fast Authenticated Encryption Algorithm

Schilling, R., Jelinek, M., Ortoff, M. & Unterluggauer, T., 2014, Microelectronics (Austrochip), 22nd Austrian Workshop on Microelectronics. ., p. 1-5

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Android Encryption Systems

Teufl, P., Fitzek, A. G., Hein, D., Marsalek, A., Oprisnik, A. & Zefferer, T., 2014, International Conference on Privacy & Security in Mobile Systems. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Android - On-Device Detection of SMS Catchers and Sniffers

Teufl, P., Zefferer, T., Wörgötter, C., Oprisnik, A. & Hein, D., 2014, (Accepted/In press) International Conference on Privacy & Security in Mobile Systems. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

An Implementation-Independent Evaluation Model for Server-Based Signature Solutions

Zefferer, T. & Zwattendorfer, B., 2014, 10th International Conference on Web Information Systems and Technologies. ., p. 302-309

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

An Implementation-Independent Evaluation Model for Server-Based Signature Solutions

Zefferer, T., 2014.

Research output: Contribution to conferencePosterResearch

An Optimistic Certified E-mail Protocol for the Current Internet E-mail Architecture

Tauber, A., 2014, (Accepted/In press) IEEE Conference on Communications and Network Security. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

An Overview of Cloud Identity Management-Models

Zwattendorfer, B., Zefferer, T. & Stranacher, K., 2014, Proceedings of the 10th International Conference on Web Information Systems and Technologies. ., p. 82-92

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

A Secure and Flexible Server-Based Mobile eID and e-Signature Solution

Rath, C., Roth, S., Schallar, M. & Zefferer, T., 2014, The Eighth International Conference on Digital Society. ., p. 7-12

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

A Server-Based Signature Solution for Mobile Devices

Zefferer, T., 2014, The 12th International Conference on Advances in Mobile Computing and Multimedia. ., p. 175-184

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Automatic Error Localization for Software using Deductive Verification

Könighofer, R., Tögl, R. & Bloem, R. P., 2014, Hardware and Software: Verification and Testing - Proceedings of the 10th International Haifa Verification Conference (HVC 2014). Berlin Heidelberg: Springer, Vol. 8855. p. 92-98 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Automating Test-Suite Augmentation

Bloem, R. P., Könighofer, R., Röck, F. & Tautschnig, M., 2014, International Conference on Quality Software. ., p. 67-72

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Branching Heuristics in Differential Collision Search with Applications to SHA-512

Eichlseder, M., Mendel, F. & Schläffer, M., 2014, Fast Software Encryption. Springer, Vol. 8540. p. 473-488 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Building blocks to facilitate electronic communication in various domains: eID and eSignature

Leitold, H. & Soykan, E. U., 7 Nov 2014.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

By invitation only: restricting external device access on trusted embedded systems

Kastner, T., Winter, J. & Tögl, R., 2014, Proc. UCAWSN 2014. Seoul: Future Technology Research Association, p. 59-59

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Clock Glitch Attacks in the Presence of Heating

Korak, T., Hutter, M., Ege, B. & Batina, L., 2014, (Accepted/In press) Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2014, Busan, Korea, September 23, 2014, Proceedings. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Cloud4Europe – D3.1 Standards, normalization and certifications associated

C4EU WG, May 2014

Research output: Book/ReportCommissioned reportResearch

Open Access
File

Cloud4Europe – D3.2 Public Sector Study

C4EU WG, Dec 2014

Research output: Book/ReportCommissioned reportResearch

Open Access
File

Collision Attack on 5 Rounds of Grøstl

Mendel, F., Rijmen, V. & Schläffer, M., 2014, Fast Software Encryption. Springer, Vol. 8540. p. 509-521 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Control-Flow Integrity: Compiler Assisted Signature Monitoring

Werner, M., 2014

Research output: ThesisMaster's ThesisResearch

Open Access
File
Flow control
Monitoring
Smart cards
Cryptography
Hardware

Controller Synthesis with Uninterpreted Functions

Hofferek, G., 2014

Research output: ThesisDoctoral ThesisResearch

Open Access
File

Curved Tags - A Low-Resource ECDSA Implementation tailored for RFID

Peßl, P. & Hutter, M., 2014, Workshop on RFID Security - RFIDsec 2014, 10th Workshop, Oxford, UK, July 21 -23, 2014, Proceedings.. Springer, (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

File

Demiurge: A SAT-Based Synthesis Tool

Könighofer, R. & Seidl, M., 2014, .

Research output: Book/ReportOther reportResearch

Open Access
File

Design and Application of a Secure and Flexible Server-Based Mobile eID and e-Signature Solution

Rath, C., Roth, S., Schallar, M. & Zefferer, T., 30 Dec 2014, In : International Journal on Advances in Security . 7, 3&4, p. 50-61

Research output: Contribution to journalArticleResearch

Open Access
File

Design und Implementierung eines Localhost Signaturgateways

Derler, D., Rath, C., Horsch, M. & Wich, T., 2014, Proceedings D-A-CH Security 2014. ., p. 36-45

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Development of an ARM TrustZone aware operating system ANDIX OS

Fitzek, A. G., 2014

Research output: ThesisMaster's ThesisResearch

Open Access
File

Differential Cryptanalysis of SipHash

Dobraunig, C. E., Mendel, F. & Schläffer, M., 2014, Selected Areas in Cryptography. Joux, A. (ed.). Springer, Vol. 8781. p. 165-182 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Do you think your passwords are secure?

Ziegler, D., Stromberger, C., Rauter, M., Teufl, P. & Hein, D., 2014, (Accepted/In press) International Conference on Privacy & Security in Mobile Systems. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Efficient Multiplication on Low-Resource Devices

Wieser, W. & Hutter, M., 2014, (Accepted/In press) Euromicro Conference on Digital System Design Architectures, Methods and Tools -- DSD 2014, Verona, Italy, August, 27-29, 2014, Proceedings. IEEE Computer Society

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Efficient Pairings and ECC for Embedded Systems

Unterluggauer, T. & Wenger, E., 2014, Cryptographic Hardware and Embedded Systems - CHES 2014, 16th International Workshop, Busan, Korea, September 23 - September 26, 2014, Proceedings.. Springer, Vol. 8731. p. 298-315 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Efficient Public Administration Procedures Across Borders

Stranacher, K. & Zwattendorfer, B., 2014, Proceedings of 10th Central and Eastern European eGov Days. ., p. 317-327

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

EM-Based Detection of Hardware Trojans on FPGAs

Söll, O., Korak, T., Muehlberghuber, M. & Hutter, M., 2014, (Accepted/In press) IEEE International Symposium on Hardware-Oriented Security and Trust -- HOST 2014, Arlington, Virginia, USA, May 6-7. Institute of Electrical and Electronics Engineers

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

EM Leakage of RFID Devices - Comparison of Two Measurement Approaches

Korak, T. & Plos, T., 2014, The 9th International Conference on Availability, Reliability and Security (ARES 2014). Institute of Electrical and Electronics Engineers, p. 120-125

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review