Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output 1983 2020

Dynamic Enforcement of Platform Integrity

Pirker, M., Tögl, R. & Gissing, M., 2010, Trust and Trustworthy Computing . Acquisti, A., Smith, S. W. & Sadeghi, A-R. (eds.). Berlin Heidelberg: Springer, Vol. 6101. p. 265-272 (Lecture Notes in Computer Science; vol. 6101).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

ECC is Ready for RFID - A Proof in Silicon

Hein, D., Wolkerstorfer, J. & Felber, N., 2009, Selected Areas in Cryptography. Avanzi, R., Keliher, L. & Sica, F. (eds.). Berlin: Springer Verlag, Vol. 5381. p. 401-413 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

ECC is Ready for RFID – A Proof in Silicon

Hein, D., Wolkerstorfer, J. & Felber, N., 2008, (Accepted/In press) Proceedings of SAC 2008. Springer, (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

ECC is Ready for RFID – A Proof in Silicon

Hein, D., Wolkerstorfer, J. & Felber, N., 2008, Informal Proceedings. ., p. x-y

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

ECC Processor with Small Footprint for RFID Applications

Fürbass, F. & Wolkerstorfer, J., 2007, IEEE International Symposium on Circuits and Systems. ., p. xx-yy

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

ECRYPT D.VAM.15 Theoretical Models for Side-Channel Attacks

Standaert, F-X., Batina, L., Eisenbarth, T., Gierlichs, B., Kasper, T., Koeune, F., Lemke-Rust, K., Macé, F., Oswald, E., Christophe, P. & Tillich, S., 2008, .

Research output: Book/ReportOther reportResearch

ECRYPT D.VAM2 State of the Art in Hardware Architectures

Feldhofer, M. (ed.), Oswald, M. E. (ed.), Wolkerstorfer, J. (ed.), Kerstin, L. (ed.), Thomas, W. (ed.) & Francois-Xavier, S. (ed.), 2005, .

Research output: Book/ReportCommissioned reportResearch

ECRYPT Yearly Report on Algorithms and Keysizes (2007-2008)

Rechberger, C. & Rijmen, V., 2008, .

Research output: Book/ReportOther reportResearch

EDIAKT-Viewer

Stranacher, K., 2006

Research output: ThesisDiploma ThesisResearch

Efficient AES Implementations on ASICs and FPGAs

Pramstaller, N., Mangard, S., Dominikus, S. & Wolkerstorfer, J., 2005, Proceedings of Fourth Conference on the Advanced Encryption Standard AES4. Springer, Vol. 3373. p. 98-112 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Efficient and Practical Protocols for Privacy in Cloud Computing

Slamanig, D., 2011

Research output: ThesisDoctoral ThesisResearch

Efficient Collision Attack Frameworks for RIPEMD-160

Liu, F., Dobraunig, C., Mendel, F., Isobe, T., Wang, G. & Cao, Z., 1 Jan 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Boldyreva, A. & Micciancio, D. (eds.). Springer-Verlag Italia, p. 117-149 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11693 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Collision Attack
Data storage equipment
Time Complexity
Framework
Guess

Efficient FPGA Implementations of LowMC and Picnic

Kales, D., Ramacher, S., Rechberger, C., Walch, R. & Werner, M., 2019, (Accepted/In press) Topics in Cryptology – CT-RSA 2020: The Cryptographers’ Track at the RSA Conference 2020, San Francisco, CA, USA, February 24–28, 2020, Proceedings. Jarecki, S. (ed.). San Francisco, CA, USA: Springer

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
Field programmable gate arrays (FPGA)
Hardware
Standardization
Quantum cryptography

Efficient Information-Flow Verification Under Speculative Execution

Bloem, R., Jacobs, S. & Vizel, Y., 2019, Efficient Information-Flow Verification Under Speculative Execution.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Efficient Multiplication on Low-Resource Devices

Wieser, W. & Hutter, M., 2014, (Accepted/In press) Euromicro Conference on Digital System Design Architectures, Methods and Tools -- DSD 2014, Verona, Italy, August, 27-29, 2014, Proceedings. IEEE Computer Society

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Efficient Pairings and ECC for Embedded Systems

Unterluggauer, T. & Wenger, E., 2014, Cryptographic Hardware and Embedded Systems - CHES 2014, 16th International Workshop, Busan, Korea, September 23 - September 26, 2014, Proceedings.. Springer, Vol. 8731. p. 298-315 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Efficient Public Administration Procedures Across Borders

Stranacher, K. & Zwattendorfer, B., 2014, Proceedings of 10th Central and Eastern European eGov Days. ., p. 317-327

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Efficient Schemes for Anonymous yet Authorized and Bounded Use of Cloud Resources

Slamanig, D., 2011, 18th International Workshop on Selected Areas in Cryptography (SAC 2011). Springer Verlag, Vol. 7118. p. 73-91 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves

Hanser, C. & Slamanig, D., 2013, 10th International Conference on Security and Cryptography (SECRYPT 2013), Reykjavik, Iceland, 29-31 July 2013. (Full version Cryptology ePrint Archive Report 2013/392). ., p. 15-26

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Efficient Vector Implementations of AES-based Designs: A Case Study and New Implementations for Grøstl

Holzer-Graf, S., Krinninger, T., Pernull, M. A., Schläffer, M., Schwabe, P., Seywald, D. & Wieser, W., 2013, CT-RSA. ., Vol. 7779. p. 145-161 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Effizientes Testen von E-Government Komponenten in der Cloud

Krnjic, V., Weber, P., Zefferer, T. & Zwattendorfer, B., 2013, Arbeitskonferenz DACH Security. Nürnberg: ., p. 225-236

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

eGov-Bus: Dissemination and Exploitation Plan

Leitold, H., Orthacker, C., Stranacher, K., Staniszkis, W., Strychowski, J., Bourget, N., Risch, T., Litwin, W., Zarycka, A., Adamus, R. & Orlov, A., 2006, .

Research output: Book/ReportCommissioned reportResearch

eGov-Bus: Scenarios and requirements analysis

Leitold, H., Orthacker, C., Stranacher, K., Roessler, T. G., Glowacki, E., Habela, P., Pieciukiewicz, T., Stencel, K., Subieta, K., Momotko, M., Staniszkis, W., Strychowski, J., Bourget, N. & Drege, T., 2006, .

Research output: Book/ReportCommissioned reportResearch

E-Government in the Public Cloud: Requirements and Opportunities

Abraham, A., Hörandner, F., Zefferer, T. & Zwattendorfer, B., 2020, In : Electronic Government. 16, 1

Research output: Contribution to journalArticleResearchpeer-review

public sector
public
services

eGovernment-modules for creating and verifying digital signatures

Scheibelhofer, K., Bauer, W. & Lipp, P., 20 May 2003.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

eID Interoperability (chapter 12)

Leitold, H., Posch, R., Rannenberg, K. & Krontiris, I., 2010, Handbook of eID Security: Concepts, Practical Experiences, Technologies. 1 ed. Graz: Publicis Publishing, p. 167-186

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

e-ID in the Cloud with SCIM

Suzic, B., 2015, Zentrum für sichere Informationstechnologie - Austria. 41 p.

Research output: Book/ReportCommissioned reportResearch

File

E-ID Meets E-Health on a Pan-European Level

Zwattendorfer, B., Zefferer, T. & Tauber, A., 2011, Proceedings of the IADIS International Conference e-Health 2011. ., p. 97-104

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Eine 8-bit Highspeed Softwareimplementierung von Whirlpool

Könighofer, R., Berger, S. & Herbst, C., 2007, DACH Security 2007. Syssec, p. 459-470 (IT security & IT management).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Eine universelle AES Hardware Architektur

Dominikus, S., 2002, (Submitted) Proceedings of Austrochip 2002. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Ein interoperabler Container für elektronische Dokumente

Stranacher, K. & Zwattendorfer, B., 2012, D-A-CH Security 2012. ., p. 421-431

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Einsatz und Bedeutung elliptischer Kurven für die elektronische Signatur

Oswald, M. E., 2001, .

Research output: Book/ReportOther reportResearch

Ein virtuelles Testframework für E-Government Komponenten

Zefferer, T., Krnjic, V. & Zwattendorfer, B., 2011, D-A-CH Security 2011. ., p. 492-503

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Electronic Health Records: An Enhanced Security Paradigm to Preserve Patient's Privacy

Slamanig, D. & Stingl, C., 2010, International Joint Conference, BIOSTEC 2009, Revised Selected Papers. Springer Verlag, Vol. 52. p. 369-380 (Communications in Computer and Information Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Electronic Signatures and Infrastructures (ESI); Procedures for Creation and Validation of AdES Digital Signatures; Part 2: Signature Validation Report

Lipp, P., 20 Feb 2019, Sophia Antipolis : European Telecommunications Standards Institute, ETSI.

Research output: Other contributionResearch

Electronic Signatures and Infrastructures (ESI);Provision of harmonized Trust Service Provider status information

Sauer, J., Wilsher, R., Lipp, P. & Giessmann, E. G., 2003

Research output: Non-print formWebsite / Web publicationResearch

Electronic Voting over the Internet - an E-Government Speciality

Rössler, T. G., 2007

Research output: ThesisDoctoral ThesisResearch

Open Access
File

Electronic Voting using Identity Domain Separation and Hardware Security Modules

Rössler, T., 2009, Software Services for e-Business and e-Society : Proceedings of the 9th IFIP WG6.1 Conference. Godart, C., Canals, G., Gronau, N. & Sharma, S. (eds.). Heidelberg New York: Springer Berlin Heidelberg New York, Vol. 305. p. 1-12 (IFIP AICT).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Electronic Voting Using Identity Domain Separation and Hardware Security Modules

Rössler, T., 2010, In : International journal of e-adoption. 2, 1, p. 30-44

Research output: Contribution to journalArticleResearchpeer-review

Elektronische Geschäftsprozesse in der öffentlichen Verwaltung

Roessler, T. G. & Palkovits, S., 2004, (Submitted) Arbeitskonferenz Elektronische Geschäftsprozesse. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Elektronische Identität und Stellvertretung in Österreich

Tauber, A., Zwattendorfer, B. & Stranacher, K., 2013, D-A-CH Security 2013. ., p. 1-9

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Elektronisches Einschreiben im D-A-CH Raum

Tauber, A., Zefferer, T. & Zwattendorfer, B., 2011, D-A-CH Security 2011. ., p. 510-521

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Elektronische Vollmachten

Roessler, T. G., 2005, e|GOV Days 2005. ., p. 27-34

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Elektronische Vollmachten im österreichischen E-Government

Tauber, A. & Rössler, T., 2009, In : eGovernment review. 4, p. 22-23

Research output: Contribution to journalArticleResearch

Elektronische Zustellung in Europa - Vision eines grenzüberschreitenden Einschreibens

Tauber, A., 2011, In : Datenschutz und Datensicherheit. 35, p. 774-778

Research output: Contribution to journalArticleResearch

Elliptic Curve Cryptography ASIC for Radio Frequency Authentication

Hein, D., 2008

Research output: ThesisDiploma ThesisResearch

Open Access
File

Elliptic-Curve Cryptography Implementation for Passive RFID Tags

Lenz, T., 2011

Research output: ThesisMaster's ThesisResearch

Elliptic Curve Cryptography in Practice — The Austrian Citizen Card for e-Government Applications

Großschädl, J., Kamendje Tchokobou, G. A., Oswald, M. E. & Posch, R., 2002, Proceedings of the International Conference on Advances in Infrastructure for Electronic Business, Education, Science and Medicine on the Internet (SSGRR 2002W). ., p. -

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Elliptic Curve Cryptography on the WISP UHF RFID Tag

Pendl, C., Pelnar, M. & Hutter, M., 2011, Workshop on RFID Security - RFIDsec 2011, 7th Workshop, Amherst, Massachusetts, USA, June 26-28, 2011, Proceedings. Berlin/Heidelberg: Springer, Vol. 7055. p. 32-47 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Elliptic Curve Cryptography on WISPs

Hutter, M., Wenger, E., Pelnar, M. & Pendl, C., 2012, (Accepted/In press) Security and Trends in Wireless Identification and Sensing Platform Tags: Advancements in RFID. 1 ed. .

Research output: Chapter in Book/Report/Conference proceedingChapterResearch