Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output

Filter
Article
2020

E-Government in the Public Cloud: Requirements and Opportunities

Abraham, A., Hörandner, F., Zefferer, T. & Zwattendorfer, B., 2020, In : Electronic Government. 16, 1

Research output: Contribution to journalArticleResearchpeer-review

ISAP v2.0

Dobraunig, C., Eichlseder, M., Mangard, S., Mendel, F., Mennink, B., Primas, R. & Unterluggauer, T., 2020, (Accepted/In press) In : IACR Transactions on Symmetric Cryptology. 2020, Special Issue

Research output: Contribution to journalArticleResearchpeer-review

Protecting against Statistical Ineffective Fault Attacks

Daemen, J., Dobraunig, C., Eichlseder, M., Groß, H., Mendel, F. & Primas, R., 2020, (Accepted/In press) In : IACR Transactions on Cryptographic Hardware and Embedded Systems. 2020, 3

Research output: Contribution to journalArticleResearchpeer-review

Selective End-To-End Data-Sharing in the Cloud

Hörandner, F., Ramacher, S. & Roth, S., 2020, (Accepted/In press) In : Journal of Banking and Financial Technology.

Research output: Contribution to journalArticleResearchpeer-review

2019

Analyzing the Linear Keystream Biases in AEGIS

Eichlseder, M., Nageler, M. & Primas, R., 2019, In : IACR Transactions on Symmetric Cryptology. 2019, 4, p. 348-368

Research output: Contribution to journalArticleResearchpeer-review

Open Access

ConTExT: Leakage-Free Transient Execution

Schwarz, M., Schilling, R., Kargl, F., Lipp, M., Canella, C. & Gruss, D., 22 May 2019, In : arXiv.org e-Print archive. 14 p.

Research output: Contribution to journalArticleResearch

Interactive Quality Analytics of User-generated Content: An Integrated Toolkit for the Case of Wikipedia

Sciascio, C. D., Strohmaier, D., Errecalde, M. & Veas, E., Apr 2019, In : ACM Transactions on Interactive Intelligent Systems . 9, 2-3, p. 1-42 42 p., 13.

Research output: Contribution to journalArticleResearchpeer-review

Joint Reconstruction and Classification of Tumor Cells and Cell Interactions in Melanoma Tissue Sections with Synthesized Training Data

Effland, A., Kobler, E., Brandenburg, A., Klatzer, T., Neuhäuser, L., Hölzel, M., Landsberg, J., Pock, T. & Rumpf, M., 2019, In : International Journal of Computer Assisted Radiology and Surgery.

Research output: Contribution to journalArticleResearchpeer-review

Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge

Derler, D. & Slamanig, D., 2019, In : Designs, Codes, and Cryptography. 87, 6, p. 1373-1413

Research output: Contribution to journalArticleResearchpeer-review

Practical Enclave Malware with Intel SGX

Schwarz, M., Weiser, S. & Gruss, D., 8 Feb 2019, In : arXiv.org e-Print archive. arXiv:1902.03256 .

Research output: Contribution to journalArticleResearch

Privacy-preserving attribute aggregation in eID federations

Priesnitz Filho, W., Ribeiro, C. & Zefferer, T., 1 Mar 2019, In : Future Generation Computer Systems. 92, Volume 92, p. 1-16 16 p.

Research output: Contribution to journalArticleResearchpeer-review

Synthesizing adaptive test strategies from temporal logic specifications

Bloem, R., Fey, G., Greif, F., Könighofer, R., Pill, I., Riener, H. & Röck, F., 2019, In : Formal methods in system design. 55, 2, p. 103-135 33 p.

Research output: Contribution to journalArticleResearchpeer-review

Open Access

Zero-correlation attacks on tweakable block ciphers with linear tweakey expansion

Ankele, R., Dobraunig, C., Guo, J., Lambooij, E., Leander, G. & Todo, Y., 19 Mar 2019, In : IACR Transactions on Symmetric Cryptology. 2019, 1, p. 192-235 44 p.

Research output: Contribution to journalArticleResearchpeer-review

2018

A Federation of Federations: Secure Cloud Federations meet European Identity Federations

Zefferer, T., Ziegler, D. & Reiter, A., Mar 2018, In : International Journal for Information Security Research. Volume 8, Issue 1

Research output: Contribution to journalArticleResearchpeer-review

A Review of Depth and Normal Fusion Algorithms

Antensteiner, D., Stolc, S. & Pock, T., 2018, In : Sensors .

Research output: Contribution to journalArticleResearchpeer-review

Assessment of the generalization of learned image reconstruction and the potential for transfer learning

Knoll, F., Hammernik, K., Kobler, E., Pock, T., Recht, M. P. & Sodickson, D. K., 2018, In : Magnetic Resonance in Medicine. 81, 1, p. 116-128 13 p.

Research output: Contribution to journalArticleResearchpeer-review

A unified masking approach

Gross, H. & Mangard, S., 1 Mar 2018, In : Journal of cryptographic engineering.

Research output: Contribution to journalArticleResearchpeer-review

Clustering Related-Tweak Characteristics: Application to MANTIS-6

Eichlseder, M. & Kales, D., 2018, In : IACR Transactions on Symmetric Cryptology. 2018, 2, p. 111-132

Research output: Contribution to journalArticleResearchpeer-review

Open Access

Differential Fault Attacks on Deterministic Lattice Signatures

Peßl, P. & Groot Bruinderink, L., 2018, In : IACR Transactions on Cryptographic Hardware and Embedded Systems. 2018, 3, p. 21-43

Research output: Contribution to journalArticleResearchpeer-review

Open Access

Erfahrungen aus eIDAS Zertifizierung: Fernsignaturen vs. Smartcards: andere Technologie damit auch anderer Zugang der Sicherheitsbewertung

Leitold, H. & Konrad, D., Jul 2018, In : Datenschutz und Datensicherheit. 42, 7, p. 429-433

Research output: Contribution to journalArticleResearchpeer-review

Expansion-Based QBF Solving Without Recursion

Bloem, R., Braud-Santoni, N., Hadzic, V., Egly, U., Lonsing, F. & Seidl, M., 2018, In : arXiv.org e-Print archive. CoRR

Research output: Contribution to journalArticleResearch

Generic Low-Latency Masking in Hardware

Groß, H., Iusupov, R. & Bloem, R., 31 Aug 2018, In : IACR Transactions on Cryptographic Hardware and Embedded Systems. 2018, 2, p. 1-21

Research output: Contribution to journalArticleResearchpeer-review

Open Access

Kernel Isolation: From an Academic Idea to an Efficient Patch for Every Computer

Gruss, D., Hansen, D. & Gregg, B., Dec 2018, In : ;login: the USENIX Magazine. 43, 4, p. 10-14 5 p.

Research output: Contribution to journalArticleResearch

MEAS: memory encryption and authentication secure against side-channel attacks

Unterluggauer, T., Werner, M. & Mangard, S., 25 Jan 2018, In : Journal of cryptographic engineering. p. 1-22

Research output: Contribution to journalArticleResearchpeer-review

Open Access

Meltdown

Lipp, M., Schwarz, M., Gruss, D., Prescher, T., Haas, W., Mangard, S., Kocher, P., Genkin, D., Yarom, Y. & Hamburg, M., 3 Jan 2018, In : arXiv.org e-Print archive.

Research output: Contribution to journalArticleResearch

Nethammer: Inducing Rowhammer Faults through Network Requests

Lipp, M., Aga, M. T., Schwarz, M., Gruss, D., Maurice, C., Raab, L. & Lamster, L., 13 May 2018, In : arXiv.org e-Print archive. 15 p.

Research output: Contribution to journalArticleResearch

File

NetSpectre: Read Arbitrary Memory over Network

Schwarz, M., Schwarzl, M., Lipp, M. & Gruss, D., 27 Jul 2018, In : arXiv.org e-Print archive.

Research output: Contribution to journalArticleResearch

File

Practical Witness Encryption for Algebraic Languages Or How to Encrypt Under Groth-Sahai Proofs

Derler, D. & Slamanig, D., 2018, In : Designs, codes and cryptography. 23 p.

Research output: Contribution to journalArticleResearchpeer-review

Real-Time Intensity-Image Reconstruction for Event Cameras Using Manifold Regularisation

Munda, G., Reinbacher, C. & Pock, T., 2018, In : International Journal of Computer Vision. 126, 12, p. 1381-1393 13 p.

Research output: Contribution to journalArticleResearchpeer-review

Sharing Independence Relabeling: Efficient Formal Verification of Higher-Order Masking

Bloem, R., Groß, H., Iusupov, R., Krenn, M. & Mangard, S., 2018, In : Cryptology ePrint Archive. 2018, p. 1031 1 p.

Research output: Contribution to journalArticleResearchpeer-review

Shielded Decision-Making in MDPs

Jansen, N., Könighofer, B., Junges, S. & Bloem, R., 2018, In : arXiv.org e-Print archive. CoRR, abs/1807.06096.

Research output: Contribution to journalArticleResearchpeer-review

SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography

Dobraunig, C. E., Eichlseder, M., Korak, T., Mangard, S., Mendel, F. & Primas, R., 2018, In : IACR Transactions on Cryptographic Hardware and Embedded Systems. 2018, 3, p. 547-572

Research output: Contribution to journalArticleResearchpeer-review

Open Access

Software-based microarchitectural attacks

Gruss, D., Sep 2018, In : IT - Information technology.

Research output: Contribution to journalArticleResearch

Symbolic checking of Fuzzy CTL on Fuzzy Program Graph

Ebrahimi, M., Sotudeh, G. & Movaghar, A., 3 Feb 2018, In : Acta informatica.

Research output: Contribution to journalArticleResearchpeer-review

Open Access

Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices

Spreitzer, R., Moonsamy, V., Korak, T. & Mangard, S., 2018, In : IEEE Communications Surveys & Tutorials. 20, 1, p. 465-488 24 p.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

Variational 3D-PIV with sparse descriptors

Lasinger, K., Vogel, C., Schindler, K. & Pock, T., 10 May 2018, In : Measurement science & technology. 29, 6, 14 p., 064010.

Research output: Contribution to journalArticleResearchpeer-review

2017

Ascon hardware implementations and side-channel evaluation

Groß, H., Wenger, E., Dobraunig, C. & Ehrenhöfer, C., 2017, In : Microprocessors and microsystems - Embedded Hardware Design. 52, p. 470-479 10 p.

Research output: Contribution to journalArticleResearchpeer-review

Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features

Schwarz, M., Gruss, D., Lipp, M., Maurice, C., Schuster, T., Fogh, A. & Mangard, S., 3 Nov 2017, In : arXiv.org e-Print archive.

Research output: Contribution to journalArticleResearch

Dependable Internet of Things for Networked Cars

Großwindhager, B., Rupp, A., Tappler, M., Tranninger, M., Weiser, S., Aichernig, B., Boano, C. A., Horn, M., Kubin, G., Mangard, S., Steinberger, M. & Römer, K. U., Dec 2017, In : International Journal of Computing. 16, 4, p. 226-237

Research output: Contribution to journalArticleResearchpeer-review

ISAP - Towards Side-Channel Secure Authenticated Encryption

Dobraunig, C. E., Eichlseder, M., Mangard, S., Mendel, F. & Unterluggauer, T., 2017, In : IACR Transactions on Symmetric Cryptology. 2017, 1, p. 80-105

Research output: Contribution to journalArticleResearchpeer-review

Open Access

STORK: a real, heterogeneous, large-scale eID management system

Ribeiro, C., Leitold, H., Esposito, S. & Mitzman, D., Jul 2017, In : International Journal of Information Security.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
2016

A New Architecture for Developing Cryptographic Cloud Services

Lorünser, T., Slamanig, D., Länger, T. & Pöhls, H. C., 1 Jun 2016, In : ERCIM news. 106

Research output: Contribution to journalArticleResearch

CREDENTIAL: Secure Cloud Identity Wallet

Notario, N., Krenn, S., Zwattendorfer, B. & Hörandner, F., 2016, In : ERCIM news. 106, p. 11-12

Research output: Contribution to journalArticleResearch

Open Access

ENHANCING CROSS-BORDER EID FEDERATIONS BY USING A MODULAR AND FLEXIBLE ATTRIBUTE MAPPING SERVICE TO MEET NATIONAL LEGAL AND TECHNICAL REQUIREMENTS

Lenz, T., 18 Jan 2016, In : IADIS international journal on WWW/Internet. 13, 2, p. 52 68 p.

Research output: Contribution to journalArticleResearchpeer-review

Föderierte Autorisierung in der Europäischen Verwaltung

Lenz, T., Zwattendorfer, B., Reichstädter, P. & Pichler, P., Jan 2016, In : eGovernment review. 17, p. 14-15

Research output: Contribution to journalArticleResearch

Future Directions in Mobile Government

Zefferer, T., 2016, In : IADIS international journal on WWW/Internet. 13, 2, p. 17-33

Research output: Contribution to journalArticleResearch

Haraka v2 - Efficient Short-Input Hashing for Post-Quantum Applications

Kölbl, S., Lauridsen, M., Mendel, F. & Rechberger, C., 2016, In : IACR Transactions on Symmetric Cryptology. 2016, 2

Research output: Contribution to journalArticleResearchpeer-review

HF/UHF Dual Band RFID Transponders for an Information-Driven Public Transportation System

Zöscher, L., Spreitzer, R., Groß, H., Grosinger, J., Mühlmann, U., Amschl, D., Watzinger, H. & Bösch, W., 11 May 2016, In : e&i - Elektrotechnik und Informationstechnik. 133, 3, p. 163-175

Research output: Contribution to journalArticleResearchpeer-review

Human Computation for Constraint-based Recommenders

Ulz, T., Schwarz, M., Felfernig, A., Haas, S., Shehadeh, A., Reiterer, S. & Stettinger, M., 31 Dec 2016, In : Journal of Intelligent Information Systems. 1, 1, p. 1-21 21 p., 1.

Research output: Contribution to journalArticleResearchpeer-review