Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output 1983 2019

2014

EUF-CMA-Secure Structure-Preserving Signatures on Equivalence Classes

Fuchsbauer, G., Hanser, C. & Slamanig, D., 2014

Research output: Non-print formWebsite / Web publicationResearch

Open Access
File

Factors Influencing the Adoption of and Business Case for Cloud Computing in the Public Sector

Kuiper, E., Van Dam, F., Reiter, A. & Janssen, M., 2014, (Accepted/In press) eChallenges e-2014 Conference Proceedings. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Fault Attacks on STRNGs: Impact of Glitches, Temperature, and Underpowering on Randomness

Martin, H., Korak, T., San Millan, E. & Hutter, M., 2014, In : IEEE transactions on information forensics and security. 10, 2, p. 266-277

Research output: Contribution to journalArticleResearchpeer-review

Föderiertes Identitätsmanagement in der Cloud

Zwattendorfer, B., Stranacher, K. & Hörandner, F., 2014, D-A-CH Security 2014. ., p. 248-259

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Full-Size High-Security ECC Implementation on MSP430 Microcontrollers

Hinterwälder, G., Moradi, A., Hutter, M., Schwabe, P. & Paar, C., 2014, (Accepted/In press) Third International Conference on Cryptology and Information Security in Latin America - LATINCRYPT 2014, Florianopolis, Brazil, September 17-19, 2014. Proceedings.. Springer

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

FutureID, WP 33: eSign Services, D33.2 - Interface and Module Specification and Documentation

Horsch, M., El Yousfi, M., Rath, C., Derler, D., Wich, T., Gruner, F. & Gast, A., 2014, .

Research output: Book/ReportOther reportResearch

FutureID, WP 33: eSign Services, D33.3 - Implementation of the Framework

Derler, D., Rath, C., Liebeskind, T. & Ruff, C., 2014, .

Research output: Book/ReportOther reportResearch

FutureID, WP 33: eSign Services, D33.4 - Test Report

Derler, D., Rath, C., Liebeskind, T., Toom, M. & Özmü, E., 2014, .

Research output: Book/ReportOther reportResearch

FutureID, WP 35: Trustworthy Client Platform, D35.2 - Interface and Module Specification and Documentation

Kamm, F-M., Eichholz, J., Summerer, A., Rios, J., Busold, C., Rath, C., Pirker, M. & Lipp, P., 2014, .

Research output: Book/ReportOther reportResearch

FutureID, WP 43: Trust Services, D43.3 - Interface and Module Specification

Özmü, E., Derler, D., Rath, C. & Ituarte, N., 2014, .

Research output: Book/ReportOther reportResearch

FutureID, WP 43: Trust Services, D43.4 - Reference Implementation

Rath, C., Derler, D. & Özmü, E., 2014, .

Research output: Book/ReportOther reportResearch

Group-Signature Schemes on Constrained Devices: The Gap Between Theory and Practice

Spreitzer, R. & Schmidt, J-M., 2014, CS2'14 Proceedings. Association of Computing Machinery, p. 31-36

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
resource
evaluation
electronics
recommendation

How to Handle Assumptions in Synthesis

Bloem, R. P., Ehlers, R., Jacobs, S. & Könighofer, R., 2014, Proceedings 3rd Workshop on Synthesis. Electronic Proceedings in Theoretical Computer Science, Vol. 157. p. 34-50 (EPTCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

IAIK ECCelerate SDK 2.20

Hanser, C., 2014

Research output: Non-print formSoftwareResearch

IAIK ECCelerate SDK 2.21

Hanser, C., 2014

Research output: Non-print formSoftwareResearch

IAIK ECCelerate SDK 2.5

Hanser, C. & Prokop, L., 2014

Research output: Non-print formSoftwareResearch

IAIK ECCelerate SDK 2.51

Hanser, C. & Prokop, L., 2014

Research output: Non-print formSoftwareResearch

Identitätsmanagement in Österreich mit MOA-ID 2.0

Lenz, T., Zwattendorfer, B., Stranacher, K. & Tauber, A., 2014, In : eGovernment review. 13, p. 18-19

Research output: Contribution to journalArticleResearch

Open Access
File

Interoperability of Electronic Documents

Stranacher, K., 2014

Research output: ThesisDoctoral ThesisResearch

Key Recovery Attacks on Recent Authenticated Ciphers

Bogdanov, A., Dobraunig, C. E., Eichlseder, M., Lauridsen, M., Mendel, F., Schläffer, M. & Tischhauser, E., 2014, Progress in Cryptology - LATINCRYPT 2014. Springer, Vol. 8895. p. 274-287 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Location-dependent EM Leakage of the ATxmega Microcontroller

Korak, T., 2014, The 7th International Symposium on Foundations & Practice of Security FPS’2014. Berlin: Springer, p. 17-32

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Malicious Hashing: Eve's Variant of SHA-1

Albertini, A., Aumasson, J-P., Eichlseder, M., Mendel, F. & Schläffer, M., 2014, Selected Areas in Cryptography. Joux, A. (ed.). Springer, Vol. 8781. p. 1-19 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Measured Firmware Deployment for Embedded Microcontroller Platforms

Weiser, S., Tögl, R. & Winter, J., 2014, MeSeCCS Proceedings. SciTePress, p. 237-246

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Measuring Usability to Improve the Efficiency of Electronic Signature-based E-Government Solutions

Zefferer, T., Krnjic, V., Stranacher, K. & Zwattendorfer, B., 2014, Measuring E-government efficiency. The opinions of Public Administrators and other Stakeholders. ., p. 45-74

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks

Liu, Z., Wenger, E. & Großschädl, J., 2014, Applied Cryptography and Network Security - 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings. Springer, p. 361-379

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Multi-platform Operating System Kernels

Gruss, D., 2014

Research output: ThesisMaster's ThesisResearch

Open Access
File

On the Effects of Clock and Power Supply Tampering on Two Microcontroller Platforms

Korak, T. & Höfler, M., 2014, 11th Workshop on Fault Diagnosis and Tolerance in Cryptography. ., p. 8-17

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

On the Power of Active Relay Attacks using Custom-Made Proxies

Korak, T. & Hutter, M., 2014, 2014 IEEE International Conference on RFID (IEEE RFID) (IEEE RFID 2014). ., p. 126-133

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

On the relativistic Lagrange-Laplace secular dynamics for extrasolar systems

Grassi, L., Giorgilli, A. & Sansottera, M., 2014, Proceedings of the International Astronomical Union 9. ., p. 74-77

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

On the Security of Fresh Re-Keying to Counteract Side-Channel and Fault Attacks

Dobraunig, C. E., Eichlseder, M., Mangard, S. & Mendel, F., 2014, Smart Card Research and Advanced Applications. Springer, Vol. 8968. p. 233-244 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Open Source für europäische Signaturen: Vertrauenswürdige Basis für die elektronische Signatur

Horsch, M., Derler, D., Rath, C., Haase, H-M. & Wich, T., 2014, In : Datenschutz und Datensicherheit. 38, 4, p. 237-241

Research output: Contribution to journalArticleResearch

Parameterized Model Checking of Token-Passing Systems

Khalimov, A., Rubin, S., Jacobs, S. & Aminof, B., 2014, Verification, Model Checking, and Abstract Interpretation. McMillan, K. L. & Rival, X. (eds.). ., p. 262-281

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Parameterized Synthesis Case Study: AMBA AHB

Khalimov, A., Bloem, R. P. & Jacobs, S., 2014, SYNT 2014. ., p. 68-83

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Partial Witnesses from Preprocessed Quantified Boolean Formulas

Seidl, M. & Könighofer, R., 2014, Design, Automation and Test in Europe (DATE'14). Institute of Electrical and Electronics Engineers, p. 1-6

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices

Spreitzer, R., 2014, 4th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM). Association of Computing Machinery, p. 51-62

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Mobile devices
Sensors
Smartphones
Cameras
Acoustic waves

PIONEER - a Prototype for the Internet of Things based on an Extendable EPC Gen2 RFID Tag

Groß, H., Wenger, E., Martín, H. & Hutter, M., 2014, Workshop on RFID Security - RFIDsec 2014, 10th Workshop, Oxford, UK, July 21 -23, 2014, Proceedings.. Springer, p. 54-73 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Practical Attack on Bilinear Pairings to Disclose the Secrets of Embedded Devices

Unterluggauer, T. & Wenger, E., 2014, Availability, Reliability and Security (ARES), 2014 Ninth International Conference on. Institute of Electrical and Electronics Engineers, p. 69-77

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Privacy-Enhancing Proxy Signatures from Non-Interactive Anonymous Credentials

Derler, D., Hanser, C. & Slamanig, D., 2014, 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2014), Vienna, Austria, July 14-16. (Full version Cryptology ePrint Archive Report 2014/285). LNCS ed. Springer Verlag, Vol. 8566 . p. 49-65

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

SAT-based methods for circuit synthesis

Bloem, R. P., Egly, U., Klampfl, P., Könighofer, R. & Lonsing, F., 2014, Formal Methods in Computer-Aided Design. Institute of Electrical and Electronics Engineers, p. 31-34

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

SAT-Based Synthesis Methods for Safety Specs

Bloem, R. P., Könighofer, R. & Seidl, M., 2014, Verification, Model Checking, and Abstract Interpretation, 15th International Conference. McMillan, K. L. & Rival, X. (eds.). Berlin-Heidelberg: Springer, Vol. 8318. p. 1-20 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Secure single sign-on authentication using eIDs across public clouds

Zwattendorfer, B. & Tauber, A., 2014, In : International journal of Internet technology and secured transactions. 5, 4, p. 291-306

Research output: Contribution to journalArticleResearchpeer-review

Security Concepts for a Distributed Architecture for Activity Logging and Analysis

Pammer-Schindler, V., Stern, H., Edler, S., Hein, D., Pirker, M., Bloem, R. P. & Wertner, A., 2014, Proceeding i-KNOW '14 Proceedings of the 14th International Conference on Knowledge Technologies and Data-driven Business. New York: Association of Computing Machinery, p. ?-?

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Solving the Discrete Logarithm of a 113-bit Koblitz Curve with an FPGA Cluster

Wenger, E. & Wolfger, P., 2014, Selected Areas in Cryptography -- SAC 2014. Joux, A. (ed.). Springer, p. 363-379

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

STORK 2.0: Breaking New Grounds on eID and Mandates

Leitold, H., Lioy, A. & Ribeiro, C., 2014, Proceedings of ID World International Congress. ., p. 1-8

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

STORK 2.0 - D5.3.2 eGov4Business Go Live Planning

eGovernment4Business WG, Feb 2014, STORK 2.0 Consortium.

Research output: Book/ReportCommissioned reportResearch

Open Access
File

STORK 2.0 - D5.3.3 eGov4Business Pilot Running Phase Planning

STORK 2 eGovernment4Business WG, Mar 2014, STORK 2.0 Consortium.

Research output: Book/ReportCommissioned reportResearch

Open Access
File

Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials

Fuchsbauer, G., Hanser, C. & Slamanig, D., 16 Nov 2014, IACR .

Research output: Book/ReportOther reportResearch

Structure-Preserving Signatures on Equivalence Classes and their Application to Anonymous Credentials

Hanser, C. & Slamanig, D., 2014, Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan (R.O.C.). LNCS ed. Springer Verlag, Vol. 8873 . p. 491-511

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Supporting Decision Making and Policy Through Large Scale Pilots

Leitold, H., 2014, Proceeedings of AHFE 2014. Graz: The Printing House Inc., p. 2669-2679

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Suraq - A Controller Synthesis Tool using Uninterpreted Functions

Hofferek, G. & Gupta, A., 2014, Haifa Verification Conference. ., Vol. 8855. p. 68-74 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File