Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output 1983 2019

Filter
(Old data) Lecture or Presentation
2003

eGovernment-modules for creating and verifying digital signatures

Scheibelhofer, K., Bauer, W. & Lipp, P., 20 May 2003.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

Pure Java Server Signature Modules

Lipp, P. & Scheibelhofer, K., 8 Dec 2003.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

2004

Blackberry Mobile Data Services

Leitold, H. & Dietrich, K., 15 Nov 2004.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

Representations and Rijndael descriptions

Rijmen, V. & Oswald, M. E., 10 May 2004.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

2005

Analysis of an anonymous fair exchange e-commerce protocol

Rijmen, V. & Bechlaghem, M., 19 May 2005.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

2006

Linux powered Trusted Computing

Pirker, M. & Winkler, T., 20 May 2006.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

Linux Powered Trusted Computing

Winkler, T. & Pirker, M., 2 Jun 2006.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

Statistics of correlation and differentials in block ciphers

Daemen, J. & Rijmen, V., 4 Jan 2006.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

2007

Plateau Characteristics

Daemen, J. & Rijmen, V., 8 Jan 2007.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

2008

Encoding of Security Functionality in ISO18000-6C

Feldhofer, M., Plos, T. & Aigner, M. J., 8 Apr 2008.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

Instruction Set Extensions for Cryptography

Tillich, S. & Johann, G., 28 May 2008.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

Integrating Cryptographic Security to the EPC Gen2 Standard

Plos, T. & Aigner, M. J., 6 Mar 2008.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

2009

Aktuelle Entwicklungen bei Hashfunktionen

Illies, G. & Rechberger, C., 14 May 2009.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

Coding Schemes for Arithmetic and Logic Operations - How Robust Are They?

Plos, T. & Medwed, M., 25 Aug 2009.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

Debugging Unrealizable Specifications Using Simple Counterstrategies

Könighofer, R., Hofferek, G. & Bloem, R. P., 28 Jun 2009.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

ETISS 2009 - Mobile Lab

Dietrich, K., Winter, J. & Eckberg, J-E., 2009.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

PKI Developments in Europe

Rijmen, V. & De Cock, D., 19 Nov 2009.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

STORK Project Presentation

Leitold, H. & Pregartbauer, M., 13 Mar 2009.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

Open Access
File
2010

Biometrics in eID: Challenges and Opportunities

Austria, A-SIT. Z. F. S. I. & Gilbert, J., 8 Sep 2010.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

Mobile qualifizierte elektronische Signatur: technisches Konzept und rechtliche Bewertung

Rössler, T. & Kustor, P., 26 Feb 2010.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

2013

Model-Based MCDC Testing of Complex Decisions for the Java Card Applet Firewall

Bloem, R. P., Greimel, K., Könighofer, R. & Röck, F., 28 Oct 2013.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

Open Access
File

Nacl on 8-bit AVR Microcontrollers

Hutter, M. & Schwabe, P., 24 Jun 2013.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

2014

Building blocks to facilitate electronic communication in various domains: eID and eSignature

Leitold, H. & Soykan, E. U., 7 Nov 2014.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

2015

Austrian Mobile Signing

Lipp, P. & Leitold, H., 25 Jun 2015.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

Specification Format for Reactive Synthesis Problems

Khalimov, A., 2015.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

2016

ARMageddon: How Your Smartphone CPU breaks software-level Security and Privacy

Lipp, M. & Maurice, C. L. N., 2016.

Research output: Contribution to conference(Old data) Lecture or PresentationResearchpeer-review

Smartphones
Program processors
Application programs
Personal computing
Mountings

What could possibly go wrong with <insert x86 instruction here>?

Maurice, C. L. N. & Lipp, M., 2016.

Research output: Contribution to conference(Old data) Lecture or PresentationResearchpeer-review

Hardware
Data storage equipment
Virtual addresses
Physical addresses
Program processors