Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output

Filter
Article

AES Implementation on a Grain of Sand

Feldhofer, M., Wolkerstorfer, J. & Rijmen, V., 2005, In : IEE proceedings / information security. 152, 1, p. 13-20

Research output: Contribution to journalArticleResearchpeer-review

A Federation of Federations: Secure Cloud Federations meet European Identity Federations

Zefferer, T., Ziegler, D. & Reiter, A., Mar 2018, In : International Journal for Information Security Research. Volume 8, Issue 1

Research output: Contribution to journalArticleResearchpeer-review

Agent-Based Cloud Resource Management for Secure Cloud Infrastructures

Balogh, Z., Gatial, E., Hluchý, L., Tögl, R., Pirker, M. & Hein, D., 2014, In : Computing and informatics. 33, 6, p. 1333-1355

Research output: Contribution to journalArticleResearchpeer-review

A Highly Regular and Scalable AES Hardware Architecture

Mangard, S., Aigner, M. & Dominikus, S., 2003, In : IEEE transactions on computers. 52, 4, p. 483-491

Research output: Contribution to journalArticleResearchpeer-review

A hijacker’s guide to communication interfaces of the trusted platform module

Winter, J. & Dietrich, K., 2013, In : Computers & mathematics with applications. 65, 5, p. 748-761

Research output: Contribution to journalArticleResearchpeer-review

Analysis of the Hash Function Design Strategy called SMASH

Lamberger, M., Pramstaller, N., Rechberger, C. & Rijmen, V., 2008, In : IEEE transactions on information theory. 54, 8, p. 3647-3655

Research output: Contribution to journalArticleResearchpeer-review

Analyzing the Linear Keystream Biases in AEGIS

Eichlseder, M., Nageler, M. & Primas, R., 2019, In : IACR Transactions on Symmetric Cryptology. 2019, 4, p. 348-368

Research output: Contribution to journalArticleResearchpeer-review

Open Access

An Approach to Introducing Locality in Remote Attestation using Near Field Communications

Tögl, R. & Hutter, M., 2011, In : The journal of supercomputing. 55, 2, p. 207-227

Research output: Contribution to journalArticleResearchpeer-review

An Autonomous Attestation Token to Secure Mobile Agents in Disaster Response

Hein, D., Tögl, R. & Kraxberger, S., 2010, In : Security and communication networks. 3, 5, p. 421-438

Research output: Contribution to journalArticleResearchpeer-review

A New Architecture for Developing Cryptographic Cloud Services

Lorünser, T., Slamanig, D., Länger, T. & Pöhls, H. C., 1 Jun 2016, In : ERCIM news. 106

Research output: Contribution to journalArticleResearch

An Interoperability Standard for Certified Mail Systems

Tauber, A., Apitzsch, J. & Boldrin, L., 2012, In : Computer standards & interfaces. 34, 5, p. 452-466

Research output: Contribution to journalArticleResearchpeer-review

Approaching the Challenge of eID Interoperability: An Austrian Perspective

Tauber, A., Zefferer, T. & Zwattendorfer, B., 2012, In : European Journal of ePractice. 14, p. 22-39

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

Architectural Enhancements to Support Digital Signal Processing and Public-Key Cryptography

Großschädl, J., Tillich, S. & Posch, K-C., 2004, In : Telematik. 10, 3-4, p. 36-42

Research output: Contribution to journalArticleResearch

Architectural Support for Long Integer Modulo Arithmetic on RISC-Based Smart Cards

Großschädl, J., 2003, In : The international journal of high performance computing applications. 17, 2, p. 135-146

Research output: Contribution to journalArticleResearchpeer-review

Area, Delay, and Power Characteristics of Standard-Cell Implementations of the AES S-Box

Tillich, S., Feldhofer, M., Popp, T. & Großschädl, J., 2008, In : Journal of Signal Processing Systems. 50, 2, p. 251-261

Research output: Contribution to journalArticleResearchpeer-review

A Review of Depth and Normal Fusion Algorithms

Antensteiner, D., Stolc, S. & Pock, T., 2018, In : Sensors .

Research output: Contribution to journalArticleResearchpeer-review

Ascon hardware implementations and side-channel evaluation

Groß, H., Wenger, E., Dobraunig, C. & Ehrenhöfer, C., 2017, In : Microprocessors and microsystems - Embedded Hardware Design. 52, p. 470-479 10 p.

Research output: Contribution to journalArticleResearchpeer-review

Assessment of the generalization of learned image reconstruction and the potential for transfer learning

Knoll, F., Hammernik, K., Kobler, E., Pock, T., Recht, M. P. & Sodickson, D. K., 2018, In : Magnetic Resonance in Medicine. 81, 1, p. 116-128 13 p.

Research output: Contribution to journalArticleResearchpeer-review

A survey of certified mail systems provided on the Internet

Tauber, A., 2011, In : Computers & Security. 30, 6-7, p. 464-485

Research output: Contribution to journalArticleResearchpeer-review

A Trusted Computing Identity Collation Protocol to Simplify Deployment of New Disaster Response Devices

Danner, P. & Hein, D., 2010, In : Journal of Universal Computer Science . 16, 9, p. 1139-1151

Research output: Contribution to journalArticleResearchpeer-review

A unified masking approach

Gross, H. & Mangard, S., 1 Mar 2018, In : Journal of cryptographic engineering.

Research output: Contribution to journalArticleResearchpeer-review

Authentische und integritätsgesicherte Verwaltungsdaten

Stranacher, K., Krnjic, V. & Zefferer, T., 2013, In : eGovernment review. 11, p. 30-31

Research output: Contribution to journalArticleResearch

Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features

Schwarz, M., Gruss, D., Lipp, M., Maurice, C., Schuster, T., Fogh, A. & Mangard, S., 3 Nov 2017, In : arXiv.org e-Print archive.

Research output: Contribution to journalArticleResearch

Automatic Fault Localization for Property Checking

Fey, G., Staber, S. S., Bloem, R. P. & Drechsler, R., 2008, In : IEEE transactions on computer-aided design of integrated circuits and systems. 27, 6, p. 1138-1149

Research output: Contribution to journalArticleResearchpeer-review

Bildschirmtext - an Open Videotex Network for Text and Graphic Applications

Fellner, W-D. & Posch, R., 1987, In : Computers & graphics. 11, 4, p. 359-367

Research output: Contribution to journalArticleResearchpeer-review

Can you Really Trust your Computer Today?

Dietrich, K., Vejda, T., Tögl, R. G., Pirker, M. & Lipp, P., 2007, In : ENISA quarterly. 3, 3, p. 8-9

Research output: Contribution to journalArticleResearch

Open Access
File

Clustering Related-Tweak Characteristics: Application to MANTIS-6

Eichlseder, M. & Kales, D., 2018, In : IACR Transactions on Symmetric Cryptology. 2018, 2, p. 111-132

Research output: Contribution to journalArticleResearchpeer-review

Open Access

Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers

Daemen, J., Lamberger, M., Pramstaller, N., Rijmen, V. & Vercauteren, F., 2009, In : Computing <Wien>. 85, 1-2, p. 85-104

Research output: Contribution to journalArticleResearchpeer-review

ConTExT: Leakage-Free Transient Execution

Schwarz, M., Schilling, R., Kargl, F., Lipp, M., Canella, C. & Gruss, D., 22 May 2019, In : arXiv.org e-Print archive. 14 p.

Research output: Contribution to journalArticleResearch

CREDENTIAL: Secure Cloud Identity Wallet

Notario, N., Krenn, S., Zwattendorfer, B. & Hörandner, F., 2016, In : ERCIM news. 106, p. 11-12

Research output: Contribution to journalArticleResearch

Open Access

Cross-border certified electronic mailing: A European perspective

Tauber, A., Kustor, P. & Karning, B., 2013, In : Computer law & security review. 29, 1, p. 28-39

Research output: Contribution to journalArticleResearchpeer-review

Debugging formal specifications: a practical approach using model-based diagnosis and counterstrategies

Könighofer, R., Hofferek, G. & Bloem, R. P., 2013, In : International journal on software tools for technology transfer. 15, 5-6, p. 563-583

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

Dependable Internet of Things for Networked Cars

Großwindhager, B., Rupp, A., Tappler, M., Tranninger, M., Weiser, S., Aichernig, B., Boano, C. A., Horn, M., Kubin, G., Mangard, S., Steinberger, M. & Römer, K. U., Dec 2017, In : International Journal of Computing. 16, 4, p. 226-237

Research output: Contribution to journalArticleResearchpeer-review

Design and Application of a Secure and Flexible Server-Based Mobile eID and e-Signature Solution

Rath, C., Roth, S., Schallar, M. & Zefferer, T., 30 Dec 2014, In : International Journal on Advances in Security . 7, 3&4, p. 50-61

Research output: Contribution to journalArticleResearch

Open Access
File

Design Strategies for a Privacy-Friendly Austrian eID System in the Public Cloud

Zwattendorfer, B. & Slamanig, D., 1 Dec 2015, In : Computers & Security.

Research output: Contribution to journalArticleResearchpeer-review

Die physikalische Sicherheit eingebetteter Systeme

Mangard, S., 2012, In : Datenschutz und Datensicherheit. p. 867-871

Research output: Contribution to journalArticleResearch

Differential Fault Attacks on Deterministic Lattice Signatures

Peßl, P. & Groot Bruinderink, L., 2018, In : IACR Transactions on Cryptographic Hardware and Embedded Systems. 2018, 3, p. 21-43

Research output: Contribution to journalArticleResearchpeer-review

Open Access

Differential Side Channel Analysis Attacks on FPGA Implementations of ARIA

Kim, C., Schläffer, M. & Moon, S., 2008, In : ETRI Journal. 30, 2, p. 315-325

Research output: Contribution to journalArticleResearchpeer-review

Open Access

Distribution properties of digital expansions arising from linear recurrences.

Lamberger, M. & Thuswaldner, J., 2003, In : Mathematica Slovaca. 53, 1, p. 1-20

Research output: Contribution to journalArticleResearchpeer-review

E-Government in the Public Cloud: Requirements and Opportunities

Abraham, A., Hörandner, F., Zefferer, T. & Zwattendorfer, B., 2020, In : Electronic Government. 16, 1

Research output: Contribution to journalArticleResearchpeer-review

Electronic Voting Using Identity Domain Separation and Hardware Security Modules

Rössler, T., 2010, In : International journal of e-adoption. 2, 1, p. 30-44

Research output: Contribution to journalArticleResearchpeer-review

Elektronische Vollmachten im österreichischen E-Government

Tauber, A. & Rössler, T., 2009, In : eGovernment review. 4, p. 22-23

Research output: Contribution to journalArticleResearch

Elektronische Zustellung in Europa - Vision eines grenzüberschreitenden Einschreibens

Tauber, A., 2011, In : Datenschutz und Datensicherheit. 35, p. 774-778

Research output: Contribution to journalArticleResearch

ENHANCING CROSS-BORDER EID FEDERATIONS BY USING A MODULAR AND FLEXIBLE ATTRIBUTE MAPPING SERVICE TO MEET NATIONAL LEGAL AND TECHNICAL REQUIREMENTS

Lenz, T., 18 Jan 2016, In : IADIS international journal on WWW/Internet. 13, 2, p. 52 68 p.

Research output: Contribution to journalArticleResearchpeer-review

Equivalent descriptions for the DES

Rijmen, V., 2004, In : Electronics letters. 40, 4, p. 237-238

Research output: Contribution to journalArticleResearchpeer-review

Erfahrungen aus eIDAS Zertifizierung: Fernsignaturen vs. Smartcards: andere Technologie damit auch anderer Zugang der Sicherheitsbewertung

Leitold, H. & Konrad, D., Jul 2018, In : Datenschutz und Datensicherheit. 42, 7, p. 429-433

Research output: Contribution to journalArticleResearchpeer-review

EU-Projekt "eGov-Bus"

Stranacher, K., Zwattendorfer, B. & Orthacker, C., 2008, In : eGovernment review. 1, 2, p. 8-9

Research output: Contribution to journalArticleResearch

Open Access
File

Evaluation and Assessment of Editable Signatures for Trusted and Reliable Public Sector Data

Stranacher, K., Krnjic, V., Zwattendorfer, B. & Zefferer, T., 2013, In : Electronic Journal of e-Government . 11, 2, p. 360-372

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

Expansion-Based QBF Solving Without Recursion

Bloem, R., Braud-Santoni, N., Hadzic, V., Egly, U., Lonsing, F. & Seidl, M., 2018, In : arXiv.org e-Print archive. CoRR

Research output: Contribution to journalArticleResearch