Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output

Filter
Article
1987

Bildschirmtext - an Open Videotex Network for Text and Graphic Applications

Fellner, W-D. & Posch, R., 1987, In : Computers & graphics. 11, 4, p. 359-367

Research output: Contribution to journalArticleResearchpeer-review

1989

The Circle-Brush Algorithm

Posch, K-C. & Fellner, W-D., 1989, In : ACM Transactions on Graphics. 8, 1, p. 1-24

Research output: Contribution to journalArticleResearchpeer-review

2000

Softwaremodelle zur Feststellung der DPA-Anfälligkeit von Hardewaremodulen

Aigner, M. & Oswald, M. E., 2000, In : Telematik. p. 18-21

Research output: Contribution to journalArticleResearch

2002

Verification and Fault Localization for VHDL Programs

Bloem, R. P. & Wotawa, F., 2002, In : Telematik. 8, 2, p. 30-33

Research output: Contribution to journalArticleResearch

2003

A Highly Regular and Scalable AES Hardware Architecture

Mangard, S., Aigner, M. & Dominikus, S., 2003, In : IEEE transactions on computers. 52, 4, p. 483-491

Research output: Contribution to journalArticleResearchpeer-review

Architectural Support for Long Integer Modulo Arithmetic on RISC-Based Smart Cards

Großschädl, J., 2003, In : The international journal of high performance computing applications. 17, 2, p. 135-146

Research output: Contribution to journalArticleResearchpeer-review

Distribution properties of digital expansions arising from linear recurrences.

Lamberger, M. & Thuswaldner, J., 2003, In : Mathematica Slovaca. 53, 1, p. 1-20

Research output: Contribution to journalArticleResearchpeer-review

Recent trends in computer-aided verification

Bloem, R. P., 2003, CoLogNET Newsletter, 5, p. 1-2.

Research output: Contribution to specialist publicationArticleResearch

2004

Architectural Enhancements to Support Digital Signal Processing and Public-Key Cryptography

Großschädl, J., Tillich, S. & Posch, K-C., 2004, In : Telematik. 10, 3-4, p. 36-42

Research output: Contribution to journalArticleResearch

Equivalent descriptions for the DES

Rijmen, V., 2004, In : Electronics letters. 40, 4, p. 237-238

Research output: Contribution to journalArticleResearchpeer-review

Forschung an der Fakultät für Informatik

Bischof, H., Posch, K-C. & Wotawa, F., 2004, In : Forschungsjournal der Technischen Universität Graz. SS 04, p. 26-27

Research output: Contribution to journalArticleResearch

Technische Aspekte des E-Voting

Leitold, H., 2004, In : Journal für Rechtspolitik. 12, 2, p. 77-84

Research output: Contribution to journalArticleResearchpeer-review

2005

AES Implementation on a Grain of Sand

Feldhofer, M., Wolkerstorfer, J. & Rijmen, V., 2005, In : IEE proceedings / information security. 152, 1, p. 13-20

Research output: Contribution to journalArticleResearchpeer-review

Handhelds sicher nutzen

Dietrich, K., 2005, In : Kommune 21. 3, p. 68-69

Research output: Contribution to journalArticleResearch

Informatik und das Informatikstudium an der Technischen Universität Graz

Tochtermann, K., Posch, K-C. & Maurer, H., 2005, In : Telematik. 1, p. 4-6

Research output: Contribution to journalArticleResearch

2006

On a family of singular measures related to Minkowski's ?(x) function

Lamberger, M., 2006, In : Indagationes mathematicae. 17, 1, p. 45-63

Research output: Contribution to journalArticleResearchpeer-review

PROACT und E-Government-Innovationszentrum: Zwei neue Initiativen an der TU Graz

Posch, K-C., 2006, In : Forschungsjournal der Technischen Universität Graz. WS 05/06, p. 18-19

Research output: Contribution to journalArticleResearch

The NIST Cryptographic Workshop on Hash Functions

Rechberger, C., Rijmen, V. & Sklavos, N., 2006, In : IEEE security & privacy. 4, 1, p. 54-56

Research output: Contribution to journalArticleResearchpeer-review

2007

Can you Really Trust your Computer Today?

Dietrich, K., Vejda, T., Tögl, R. G., Pirker, M. & Lipp, P., 2007, In : ENISA quarterly. 3, 3, p. 8-9

Research output: Contribution to journalArticleResearch

Open Access
File

Plateau characteristics

Daemen, J. & Rijmen, V., 2007, In : IET information security. 1, 1, p. 11-18

Research output: Contribution to journalArticleResearchpeer-review

Power Analysis Attacks and Countermeasures

Popp, T., Mangard, S. & Oswald, M. E., 2007, In : IEEE design & test of computers. 24, 6, p. 535-543

Research output: Contribution to journalArticleResearchpeer-review

PROACT: RFID-Impulse an der TU Graz

Wolkerstorfer, J. & Hollaus, K., 2007, In : e&i - Elektrotechnik und Informationstechnik. 11, p. a17-a18

Research output: Contribution to journalArticleResearchpeer-review

Probability distributions of correlations and differentials in block ciphers

Daemen, J. & Rijmen, V., 2007, In : Journal of mathematical cryptology. 1, 3, p. 221-242

Research output: Contribution to journalArticleResearchpeer-review

2008

Analysis of the Hash Function Design Strategy called SMASH

Lamberger, M., Pramstaller, N., Rechberger, C. & Rijmen, V., 2008, In : IEEE transactions on information theory. 54, 8, p. 3647-3655

Research output: Contribution to journalArticleResearchpeer-review

Area, Delay, and Power Characteristics of Standard-Cell Implementations of the AES S-Box

Tillich, S., Feldhofer, M., Popp, T. & Großschädl, J., 2008, In : Journal of Signal Processing Systems. 50, 2, p. 251-261

Research output: Contribution to journalArticleResearchpeer-review

Automatic Fault Localization for Property Checking

Fey, G., Staber, S. S., Bloem, R. P. & Drechsler, R., 2008, In : IEEE transactions on computer-aided design of integrated circuits and systems. 27, 6, p. 1138-1149

Research output: Contribution to journalArticleResearchpeer-review

Differential Side Channel Analysis Attacks on FPGA Implementations of ARIA

Kim, C., Schläffer, M. & Moon, S., 2008, In : ETRI Journal. 30, 2, p. 315-325

Research output: Contribution to journalArticleResearchpeer-review

Open Access

EU-Projekt "eGov-Bus"

Stranacher, K., Zwattendorfer, B. & Orthacker, C., 2008, In : eGovernment review. 1, 2, p. 8-9

Research output: Contribution to journalArticleResearch

Open Access
File

FutureLabs@Informatik.TUGraz

Posch, K-C., 2008, In : Forschungsjournal der Technischen Universität Graz. p. 38-41

Research output: Contribution to journalArticleResearch

Giving an interoperable e-ID solution: Using foreign e-IDs in Austrian e-Government

Rössler, T., 2008, In : The Computer law and security report. 24, 5, p. 447-453

Research output: Contribution to journalArticleResearchpeer-review

New Results on NMAC/HMAC when Instantiated with Popular Hash Functions

Rechberger, C. & Rijmen, V., 2008, In : Journal of Universal Computer Science . 14, 3, p. 347-376

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

Privacy-enhancing methods for e-health applications: how to prevent statistical analyses and attacks

Stingl, C. & Slamanig, D., 2008, In : International journal of business intelligence and data mininig. 37, 3, p. 236-254

Research output: Contribution to journalArticleResearchpeer-review

Rotation symmetry in algebraically generated cryptographic substitution tables

Rijmen, V., Barreto, P. S. L. M. & Filho, D. G., 2008, In : Information Processing Letters. 106, 6, p. 246-250

Research output: Contribution to journalArticleResearchpeer-review

2009

Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers

Daemen, J., Lamberger, M., Pramstaller, N., Rijmen, V. & Vercauteren, F., 2009, In : Computing <Wien>. 85, 1-2, p. 85-104

Research output: Contribution to journalArticleResearchpeer-review

Elektronische Vollmachten im österreichischen E-Government

Tauber, A. & Rössler, T., 2009, In : eGovernment review. 4, p. 22-23

Research output: Contribution to journalArticleResearch

Green cryptography: cleaner engineering through recycling

Rijmen, V. & Troutman, J., 2009, In : IEEE security & privacy. 7, 4, p. 71-73

Research output: Contribution to journalArticleResearchpeer-review

Green cryptography: cleaner engineering through recycling, Part 2

Rijmen, V. & Troutman, J., 2009, In : IEEE security & privacy. 7, 5, p. 64-65

Research output: Contribution to journalArticleResearchpeer-review

New criteria for linear maps in AES-like ciphers

Daemen, J. & Rijmen, V., 2009, In : Cryptography and communications. 1, 1, p. 47-69

Research output: Contribution to journalArticleResearchpeer-review

Numerical solvers and cryptanalysis

Nad, T., Lamberger, M. & Rijmen, V., 2009, In : Journal of mathematical cryptology. 3, 3, p. 249-263

Research output: Contribution to journalArticleResearchpeer-review

Performance Optimizations for DAA Signatures on Java enabled Platforms

Dietrich, K. & Röck, F., 2009, In : Journal of Universal Computer Science . p. xxx-xxx

Research output: Contribution to journalArticleResearchpeer-review

Wireless LAN MAC-Layer Address Spoofing with Fingerprinting Methods

Lackner, G., Payer, U. & Teufl, P., 2009, In : International journal of network security. Vol. 9, No. 2, p. 164-172

Research output: Contribution to journalArticleResearch

2010

An Autonomous Attestation Token to Secure Mobile Agents in Disaster Response

Hein, D., Tögl, R. & Kraxberger, S., 2010, In : Security and communication networks. 3, 5, p. 421-438

Research output: Contribution to journalArticleResearchpeer-review

A Trusted Computing Identity Collation Protocol to Simplify Deployment of New Disaster Response Devices

Danner, P. & Hein, D., 2010, In : Journal of Universal Computer Science . 16, 9, p. 1139-1151

Research output: Contribution to journalArticleResearchpeer-review

Electronic Voting Using Identity Domain Separation and Hardware Security Modules

Rössler, T., 2010, In : International journal of e-adoption. 2, 1, p. 30-44

Research output: Contribution to journalArticleResearchpeer-review

On the Duality of Probing and Fault Attacks

Gammel, B. M. & Mangard, S., 2010, In : Journal of electronic testing. 26, 4, p. 483-493

Research output: Contribution to journalArticleResearchpeer-review

On the Security of RFID Devices against Implementation Attacks

Hutter, M., Plos, T. & Feldhofer, M., 2010, In : International journal of security and networks. 5, 2/3, p. 106-118

Research output: Contribution to journalArticleResearchpeer-review

Privatzustellung – Der elektronisch eingeschriebene Brief

Tauber, A. & Reichstädter, P., 2010, In : eGovernment review. 5, p. 18-19

Research output: Contribution to journalArticleResearch

Reconstruction of electronic signatures from eDocument printouts

Leitold, H., Posch, R. & Rössler, T., 2010, In : Computers & Security. 29, 5, p. 523-532

Research output: Contribution to journalArticleResearchpeer-review