Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output 1983 2020

Filter
Other report
2001

Einsatz und Bedeutung elliptischer Kurven für die elektronische Signatur

Oswald, M. E., 2001, .

Research output: Book/ReportOther reportResearch

2003

Report on the First XAdES Interop-Event

Lipp, P. & Centner, M., 2003, .

Research output: Book/ReportOther reportResearch

2004

ART WP2 Requirements Specification Report

Feldhofer, M., Aigner, M. J. & Dominikus, S., 2004, .

Research output: Book/ReportOther reportResearch

ART WP3 System Architecture Specification Report

Aigner, M. J., Feldhofer, M. & Dominikus, S., 2004, .

Research output: Book/ReportOther reportResearch

SCARD D1.2 Requirement Specification Report

Aigner, M. J., Mangard, S. & Popp, T., 2004, .

Research output: Book/ReportOther reportResearch

Zwischenbericht Projekt Langzeitsignaturen

Lipp, P., 2004, .

Research output: Book/ReportOther reportResearch

2005

ART WP5 AES Module Architecture

Feldhofer, M., Aigner, M. J. & Dominikus, S., 2005, .

Research output: Book/ReportOther reportResearch

ART WP5 TINA Test-Chip - DPA Attack

Popp, T., Feldhofer, M., Aigner, M. J. & Dominikus, S., 2005, .

Research output: Book/ReportOther reportResearch

ART WP5 TINA Test-Chip Specification

Feldhofer, M., Aigner, M. J. & Dominikus, S., 2005, .

Research output: Book/ReportOther reportResearch

ART WP5 TINA Test Report

Feldhofer, M., Aigner, M. J. & Dominikus, S., 2005, .

Research output: Book/ReportOther reportResearch

Hardware Crackers

Oswald, M. E. (ed.), Batina, L. (ed.), Pelzl, J. (ed.), Priplata, C. (ed.), Stahlke, C. (ed.) & Francois-Xavier, S. (ed.), 2005, .

Research output: Book/ReportOther reportResearch

Mistral Security Document

Schläffer, M., 2005, .

Research output: Book/ReportOther reportResearch

POSITIF D5.2: BSM definition

Payer, U., Kraxberger, S. & Lamberger, M., 2005, .

Research output: Book/ReportOther reportResearch

SCARD D2.3 DPA Proof Logic Styles - Technical Report

Popp, T., Mangard, S. & Aigner, M. J., 2005, .

Research output: Book/ReportOther reportResearch

SCARD D2.4 Final Report Logic & Cell Library Development

Aigner, M. J., Popp, T. & Mangard, S., 2005, .

Research output: Book/ReportOther reportResearch

SCARD D5.5 Final Report EDA Framework Development

Valentini, E. & Popp, T., 2005, .

Research output: Book/ReportOther reportResearch

SCARD D6.1 Final Report Modeling & Simulation of SCA Effects

Trifiletti, A., Popp, T., Aigner, M. J., Mangard, S. & Batina, L., 2005, .

Research output: Book/ReportOther reportResearch

SCARD D7.1 Specification SCARD Chip

Roth, M., Tillich, S., Aigner, M. J., Popp, T. & Mangard, S., 2005, .

Research output: Book/ReportOther reportResearch

2006

ART- Endbericht von TUG

Aigner, M. J., Feldhofer, M. & Dominikus, S., 2006, .

Research output: Book/ReportOther reportResearch

D.VAM11 -- Suggested Algorithms for Light-Weight Cryptography

Aigner, M. J., Dominikus, S., Feldhofer, M., Rechberger, C. & Oswald, M. E., 2006, . (ECRYPT Deliverable)

Research output: Book/ReportOther reportResearch

OpenTC PET Scenario - Bank and Client Proxy Architectural Design

Dietrich, K., Winkler, T. & Pirker, M., 2006, .

Research output: Book/ReportOther reportResearch

OpenTC PET Scenario Specification - Description of the Client Proxy / Server Proxy Approach

Dietrich, K., Pirker, M. & Winkler, T., 2006, .

Research output: Book/ReportOther reportResearch

OpenTC WP05d Requirements Analysis - Key management infrastructure and public key enablement

Dietrich, K., Pirker, M. & Winkler, T., 2006, .

Research output: Book/ReportOther reportResearch

OpenTC WP3 Report - Integrating Trusted Computing into the Java Programming Language

Dietrich, K., Demuth, M., Malin, J., Lipp, P., Pirker, M. & Winkler, T., 2006, .

Research output: Book/ReportOther reportResearch

POSITIF D5.1: STM specification, design and implementation

Payer, U., Kraxberger, S. & Lamberger, M., 2006, .

Research output: Book/ReportOther reportResearch

POSITIF D7.2: SEM specification, design and implementation

Payer, U., Kraxberger, S. & Lackner, G., 2006, .

Research output: Book/ReportOther reportResearch

2007

Conceptual architecture of secure EP2P middleware

Kraxberger, S. & Tillich, S., 2007, .

Research output: Book/ReportOther reportResearch

Concrete architecture of secure EP2P middleware services

Kraxberger, S. & Tillich, S., 2007, .

Research output: Book/ReportOther reportResearch

Current Status of SHA-1

Mendel, F., Pramstaller, N., Rechberger, C. & Rijmen, V., 2007, .

Research output: Book/ReportOther reportResearch

Die TU Graz als Leuchtturm für Netzwerk- und Informationssicherheit

Leitold, H. & Posch, R., 2007, Graz: . (Forschungsjournal der Technischen Universität Graz)

Research output: Book/ReportOther reportResearch

OpenTC WP05 - Design of Basic Public-Key Infrastructure for OpenTC

Pirker, M., 2007, .

Research output: Book/ReportOther reportResearch

OpenTC WP05 - Prototype of Basic Public-Key Infrastructure for OpenTC

Pirker, M., 2007, .

Research output: Book/ReportOther reportResearch

OpenTC WP3d Report - Java VM for TCP Implementations

Vejda, T., 2007, .

Research output: Book/ReportOther reportResearch

Requirements Analysis of Mobile Trusted Modules

Dietrich, K. & Winter, J., 2007, .

Research output: Book/ReportOther reportResearch

Security Requirements of EP2P Applications

Kraxberger, S., Payer, U. & Tillich, S., 2007, .

Research output: Book/ReportOther reportResearch

SMEPP D4.2 Security services and primitives for EP2P systems

Alcaraz, C., Foo, E., Georgiades, J., Hess, E., Kargl, A., Lopez, J., Qiu, Y., Roman, R., Serf, P., Tillich, S. & Zhou, J., 2007, .

Research output: Book/ReportOther reportResearch

SMEPP D5.1.1 Specification of Secure Instruction Sets for EP2P Devices

Tillich, S., 2007, .

Research output: Book/ReportOther reportResearch

Threat Models for EP2P Networks

Kraxberger, S., Payer, U. & Tillich, S., 2007, .

Research output: Book/ReportOther reportResearch

2008

Analysis of Modern Cryptographic Hash Functions (FWF P18138-N13 Final Report)

Mendel, F. & Rijmen, V., 2008, .

Research output: Book/ReportOther reportResearch

A Roadmap towards e-Democracy

Rössler, T., 2008, .

Research output: Book/ReportOther reportResearch

Open Access
File

Component Infrastructure and Tool Implementation

Kraxberger, S., 2008, .

Research output: Book/ReportOther reportResearch

D4.3 - Security Protocols for EP2P Networks

Payer, U., Rodrigo, R., Lopez, J., Kargl, A., Hess, E., Alcaraz Tello, M. C., Zhou, J. & Qiu, Y., 2008, .

Research output: Book/ReportOther reportResearch

Differential Fault Analysis - Final Report

Schmidt, J-M., 2008, .

Research output: Book/ReportOther reportResearch

ECRYPT D.VAM.15 Theoretical Models for Side-Channel Attacks

Standaert, F-X., Batina, L., Eisenbarth, T., Gierlichs, B., Kasper, T., Koeune, F., Lemke-Rust, K., Macé, F., Oswald, E., Christophe, P. & Tillich, S., 2008, .

Research output: Book/ReportOther reportResearch

ECRYPT Yearly Report on Algorithms and Keysizes (2007-2008)

Rechberger, C. & Rijmen, V., 2008, .

Research output: Book/ReportOther reportResearch

Evaluation of Specific Protocols

Kraxberger, S., 2008, .

Research output: Book/ReportOther reportResearch

Java Virtual Machines as Small Trusted Computing Bases: A Case Study

Pirker, M., Tögl, R., Vejda, T. & Niederl, A., 2008, .

Research output: Book/ReportOther reportResearch

Network and device specific protocols design

Kraxberger, S., 2008, .

Research output: Book/ReportOther reportResearch

Ongoing Research Areas in Symmetric Cryptography (D.STVL.9)

Rechberger, C. & Rijmen, V., 2008, .

Research output: Book/ReportOther reportResearch