Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output 1983 2019

2014

Synthesis of Synchronization using Uninterpreted Functions

Bloem, R. P., Hofferek, G., Könighofer, B., Könighofer, R., Außerlechner, S. & Spörk, R., 2014, Proceedings of the 14th Conference on Formal Methods in Computer-Aided Design FMCAD 2014. ., p. 35-42

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Synthesizing Robust Systems

Bloem, R. P., Chatterjee, K., Greimel, K., Henzinger, T., Hofferek, G., Jobstmann, B., Könighofer, B. & Könighofer, R., 2014, In : Acta informatica. 51, 3, p. 193-220

Research output: Contribution to journalArticleResearchpeer-review

Towards More Practical Time-Driven Cache Attacks

Spreitzer, R. & Gérard, B., 2014, Information Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings.. Naccache, D. & Sauveron, D. (eds.). Springer, Vol. 8501. p. 24-39 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Cryptography
Galaxies
Smartphones
Side channel attack
Android (operating system)

Towards Secure Mobile Computing: Employing Power-Consumption Information to Detect Malware on Mobile Devices

Zefferer, T., Teufl, P., Derler, D., Potzmader, K., Oprisnik, A., Gasparitz, H. & Höller, A., 2014, (Submitted) In : International journal on advances in software. 7 (2014), 1&2

Research output: Contribution to journalArticleResearch

Umsetzung eines vertrauenswürdigem Open Government Data

Stranacher, K., Zwattendorfer, B., Fruhmann, S. & Koch, P. W., 2014, Arbeitskonferenz DACH Security. ., p. 236-247

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

User-Centric Identity as a Service-Architecture for eIDs with Selective Attribute Disclosure

Slamanig, D., Stranacher, K. & Zwattendorfer, B., 2014, 19th ACM Symposium on Access Control Models and Technologies (SACMAT 2014). Association of Computing Machinery, p. 153-163

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Using Bleichenbacher's Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA: Extended Version

De Mulder, E., Hutter, M., Marson, M. & Pearson, P., 2014, In : Journal of cryptographic engineering. 4, 1, p. 33-45

Research output: Contribution to journalArticleResearchpeer-review

2013

(Kopie von) FutureID, WP 35: Trustworthy Client Platform, D35.1 - Requirements Report

Kamm, F-M., Houdeau, D., Lipp, P., Rath, C., Wagner, C., Sepehrdad, P. & Neven, G., 2013, .

Research output: Book/ReportOther reportResearch

8/16/32 Shades of Elliptic Curve Cryptography on Embedded Processors

Wenger, E., Unterluggauer, T. & Werner, M., 2013, Progress in Cryptology - INDOCRYPT 2013, 14th International Conference on Cryptology in India, Mumbai, India, December 2013, Proceedings. Berlin Heidelberg: Springer, p. 244-261

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Access Without Permission: A Practical RFID Relay Attack

Silberschneider, R., Korak, T. & Hutter, M., 2013, Austrochip 2013, 21st Austrian Workshop on Microelectronics, Linz, Austria, October 10, 2013, Proceedings. Linz: ., p. 59-64

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

AES-Based Lightweight Authenticated Encryption

Bogdanov, A., Mendel, F., Regazzoni, F., Rijmen, V. & Tischhauser, E., 2013, Fast Software Encryption. Springer, Vol. 8424. p. 447-466 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

A hijacker’s guide to communication interfaces of the trusted platform module

Winter, J. & Dietrich, K., 2013, In : Computers & mathematics with applications. 65, 5, p. 748-761

Research output: Contribution to journalArticleResearchpeer-review

A Lightweight ATmega-based Application-Specific Instruction-Set Processor for Elliptic Curve Cryptography

Wenger, E., 2013, Lightweight Cryptography for Security and Privacy, Second International Workshop, LightSec 2013, Gebze, Turkey, May 2013, Revised Selected Papers. Berlin Heidelberg: Springer, p. 1-15 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Analyzing Side-Channel Leakage of RFID-Suitable Lightweight ECC Hardware

Wenger, E., Korak, T. & Kirschbaum, M., 2013, RFID Security - RFIDSec 2013, 9th Workshop, Graz, Austria, July 9-11, 2013, Proceedings. Berlin, Heidelberg: Springer, p. 128-144 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

A Path Towards Ubiquitous Protection of Media

Tögl, R., Winter, J. & Pirker, M., 2013, Proc.Workshop on Web Applications and Secure Hardware. Aachen: Technical University of Aachen, Vol. 1011. p. 32-38 (CEUR Workshop Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Applying Remote Side-Channel Analysis Attacks on a Security-enabled NFC Tag

Korak, T. & Plos, T., 2013, Topics in Cryptology - CT-RSA 2013, San Francisco, USA, February 25 - March 1, 2013, Proceedings. Berlin / Heidelberg: Springer, Vol. 7779. p. 207-222 (Lecture Notes in Computer Science (LNCS)).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

A Secure and Confidential Javascript Crypto-Framework for Cloud Storage Applications

Lenz, T., Zwattendorfer, B. & Tauber, A., 2013, IADIS International Conference WWW/INTERNET. ., p. 219-226

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

A Secure Docking Module for providing trust in Crisis Management Incidents

Fournaris, A. P., Hein, D., Fournier, J. & Brandl, H., 2013, (Accepted/In press) 11th IEEE International Conference on Industrial Informatics. Institute of Electrical and Electronics Engineers

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

A Security-Enhanced UHF RFID Tag Chip

Ertl, J., Plos, T., Feldhofer, M., Felber, N. & Henzen, L., 2013, (Accepted/In press) 16th Euromicro Conference on Digital System Design, DSD 2013. Heidelberg: Springer

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Assessing the Suitability of Current Smartphone Platforms for Mobile Government

Zefferer, T., Kreuzhuber, S. & Teufl, P., 2013, Technology-Enabled Innovation for Democracy, Government and Governance. ., p. 125-139

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Assessment of Redactable Signature Schemes for Trusted and Reliable Public Sector Data

Stranacher, K., Krnjic, V., Zwattendorfer, B. & Zefferer, T., 2013, Proceedings of the 13th European Conference on e-Government. ACPI, p. 508-516

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

A Survey and Analysis of NFC-based Payment Solutions for Smartphones

Zefferer, T., 2013, IADIS International Conference e-Society 2013. ., p. 275-282

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Authentische und integritätsgesicherte Verwaltungsdaten

Stranacher, K., Krnjic, V. & Zefferer, T., 2013, In : eGovernment review. 11, p. 30-31

Research output: Contribution to journalArticleResearch

Blank Digital Signatures

Hanser, C. & Slamanig, D., 2013, 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), Hangzhou, China, 7-10 May 2013. Note: This is the more actual version which is available as Cryptology ePrint Archive Report 2013/130. Association of Computing Machinery, p. 95-106

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Cache-Access Pattern Attack on Disaligned AES T-Tables

Spreitzer, R. & Plos, T., 2013, Constructive Side-Channel Analysis and Secure Design - COSADE 2013, 4th International Workshop, Paris, France, March 7-8, 2013, Proceedings.. Springer, p. 200-214 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Cryptography
Data storage equipment
Cache memory
Pattern matching
Smartphones

Cloud Computing in E-Government across Europe

Zwattendorfer, B., Stranacher, K., Tauber, A. & Reichstädter, P., 2013, Technology-Enabled Innovation for Democracy, Government and Governance. Springer, p. 181-195 (Lecture notes in computer science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Collisions for the WIDEA-8 Compression Function

Mendel, F., Rijmen, V., Toz, D. & Varici, K., 2013, Topics in Cryptology - CT-RSA 2013. Springer, Vol. 7779. p. 162-173 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Comparing Purely Visual with Hybrid Visual/Textual Manipulation of Complex Formula on Smartphones

Harzl, A., Krnjic, V., Schreiner, F. & Slany, W., 2013, DMS 2013. ., p. 0-0

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Cross-border certified electronic mailing: A European perspective

Tauber, A., Kustor, P. & Karning, B., 2013, In : Computer law & security review. 29, 1, p. 28-39

Research output: Contribution to journalArticleResearchpeer-review

Cryptography for Security and Privacy in Cloud Computing

Rass, S. & Slamanig, D., 2013, 1 ed. Artech House Publishers. (Information Security and Privacy)

Research output: Book/ReportBookResearch

Debugging formal specifications: a practical approach using model-based diagnosis and counterstrategies

Könighofer, R., Hofferek, G. & Bloem, R. P., 2013, In : International journal on software tools for technology transfer. 15, 5-6, p. 563-583

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

Differential Cryptanalysis of Keccak Variants

Kölbl, S., Mendel, F., Nad, T. & Schläffer, M., 2013, Cryptography and Coding. Springer, Vol. 8308. p. 141-157 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves

Hanser, C. & Slamanig, D., 2013, 10th International Conference on Security and Cryptography (SECRYPT 2013), Reykjavik, Iceland, 29-31 July 2013. (Full version Cryptology ePrint Archive Report 2013/392). ., p. 15-26

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Efficient Vector Implementations of AES-based Designs: A Case Study and New Implementations for Grøstl

Holzer-Graf, S., Krinninger, T., Pernull, M. A., Schläffer, M., Schwabe, P., Seywald, D. & Wieser, W., 2013, CT-RSA. ., Vol. 7779. p. 145-161 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Effizientes Testen von E-Government Komponenten in der Cloud

Krnjic, V., Weber, P., Zefferer, T. & Zwattendorfer, B., 2013, Arbeitskonferenz DACH Security. Nürnberg: ., p. 225-236

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Elektronische Identität und Stellvertretung in Österreich

Tauber, A., Zwattendorfer, B. & Stranacher, K., 2013, D-A-CH Security 2013. ., p. 1-9

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Enhancing the Modularity and Applicability of Web-Based Signature-Verication Tools

Lenz, T., Stranacher, K. & Zefferer, T., 2013, Webist 2013 Selected and revised papers. Lecture Notes in Business Information Processing ed. ., p. 173-188

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

Evaluation and Assessment of Editable Signatures for Trusted and Reliable Public Sector Data

Stranacher, K., Krnjic, V., Zwattendorfer, B. & Zefferer, T., 2013, In : Electronic Journal of e-Government . 11, 2, p. 360-372

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

Fast Byzantine Agreement

Braud-Santoni, N., Guerraoui, R. & Huc, F., 2013, PODC' 13. New York: Association of Computing Machinery, p. 0-0

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Fast Software Encryption Attacks on AES

Gstir, D. & Schläffer, M., 2013, Africacrypt. Springer, Vol. 7918. p. 359-374 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

FIDES: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware

Bilgin, B., Bogdanov, A., Mendel, F., Wang, Q. & Knezevic, M., 2013, Cryptographic Hardware and Embedded Systems - CHES 2013. Berlin, Heidelberg: Springer, p. 142-158 (LNCS; vol. 8086).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Finding Collisions for Round-Reduced SM3

Mendel, F., Nad, T. & Schläffer, M., 2013, Topics in Cryptology - CT-RSA 2013. Springer, Vol. 7779. p. 174-188 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

FP7 DIAMOND: Design Error Diagnosis and Correction Success Stories

Raik, J., Jenihhin, M., Könighofer, R., Hofferek, G., Finder, A. & Fey, G., 2013, (Accepted/In press) IEEE European Test Symposium. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearch

FutureID, WP 32: eID - Services, D32.4 - Implementation of Basic and Generic Modules

Horsch, M., Derler, D., Rath, C., de la Piedra, A., Gast, A., Gruner, F., Wich, T. & Kamm, F-M., 2013, .

Research output: Book/ReportOther reportResearch

FutureID, WP 33: eSign Services, D33.1 - Requirements Report

Lipp, P., Rath, C., Horsch, M., Uukkivi, K., Murumets, J., Ruff, C., Kubieziel, J. & Gutwirth, A., 2013, .

Research output: Book/ReportOther reportResearch

FutureID, WP 35: Trustworthy Client Platform, D35.1 - Requirements Report

Kamm, F-M., Houdeau, D., Lipp, P., Rath, C., Wagner, C., Sepehrdad, P. & Neven, G., 2013, .

Research output: Book/ReportOther reportResearch

Group Signatures on Mobile Devices: Practical Experiences

Potzmader, K., Winter, J., Hein, D., Hanser, C., Teufl, P. & Chen, L., 2013, 6th International Conference on Trust & Trustworthy Computing. ., p. 47-64

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Handling the NDEF Signature Record Type in a Secure Manner

Korak, T., 2013, RFID-Technologies and Applications (RFID-TA), 2012 IEEE International Conference on. Institute of Electrical and Electronics Engineers, p. 107-112

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Hardware and VLSI Designs

Kirschbaum, M. & Plos, T., 2013, (Accepted/In press) Secure Smart Embedded Devices: Platforms and Applications. 1 ed. .

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

Hardware Architectures for MSP430-based Wireless Sensor Nodes Performing Elliptic Curve Cryptography

Wenger, E., 2013, Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings. Springer, p. 290-306

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File