Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output

Filter
Article
Article

Fault Attacks on STRNGs: Impact of Glitches, Temperature, and Underpowering on Randomness

Martin, H., Korak, T., San Millan, E. & Hutter, M., 2014, In : IEEE transactions on information forensics and security. 10, 2, p. 266-277

Research output: Contribution to journalArticleResearchpeer-review

Föderierte Autorisierung in der Europäischen Verwaltung

Lenz, T., Zwattendorfer, B., Reichstädter, P. & Pichler, P., Jan 2016, In : eGovernment review. 17, p. 14-15

Research output: Contribution to journalArticleResearch

Forschung an der Fakultät für Informatik

Bischof, H., Posch, K-C. & Wotawa, F., 2004, In : Forschungsjournal der Technischen Universität Graz. SS 04, p. 26-27

Research output: Contribution to journalArticleResearch

Fortgeschrittene PDF Signaturen mit PAdES

Fitzek, A. G., Maierhofer, C., Tauber, A. & Zwattendorfer, B., 2015, In : eGovernment review. 15, p. 16-17

Research output: Contribution to journalArticleResearch

Open Access
File

Future Directions in Mobile Government

Zefferer, T., 2016, In : IADIS international journal on WWW/Internet. 13, 2, p. 17-33

Research output: Contribution to journalArticleResearch

FutureLabs@Informatik.TUGraz

Posch, K-C., 2008, In : Forschungsjournal der Technischen Universität Graz. p. 38-41

Research output: Contribution to journalArticleResearch

Generic Low-Latency Masking in Hardware

Groß, H., Iusupov, R. & Bloem, R., 31 Aug 2018, In : IACR Transactions on Cryptographic Hardware and Embedded Systems. 2018, 2, p. 1-21

Research output: Contribution to journalArticleResearchpeer-review

Open Access

Giving an interoperable e-ID solution: Using foreign e-IDs in Austrian e-Government

Rössler, T., 2008, In : The Computer law and security report. 24, 5, p. 447-453

Research output: Contribution to journalArticleResearchpeer-review

Green cryptography: cleaner engineering through recycling

Rijmen, V. & Troutman, J., 2009, In : IEEE security & privacy. 7, 4, p. 71-73

Research output: Contribution to journalArticleResearchpeer-review

Green cryptography: cleaner engineering through recycling, Part 2

Rijmen, V. & Troutman, J., 2009, In : IEEE security & privacy. 7, 5, p. 64-65

Research output: Contribution to journalArticleResearchpeer-review

Grenzüberschreitendes E-Government in Europa

Tauber, A., Zwattendorfer, B., Zefferer, T. & Stranacher, K., 2011, In : eGovernment review. 8, p. 8-9

Research output: Contribution to journalArticleResearch

Open Access
File

Handhelds sicher nutzen

Dietrich, K., 2005, In : Kommune 21. 3, p. 68-69

Research output: Contribution to journalArticleResearch

Haraka v2 - Efficient Short-Input Hashing for Post-Quantum Applications

Kölbl, S., Lauridsen, M., Mendel, F. & Rechberger, C., 2016, In : IACR Transactions on Symmetric Cryptology. 2016, 2

Research output: Contribution to journalArticleResearchpeer-review

Health Records and the Cloud Computing Paradigm from a Privacy Perspective

Stingl, C. & Slamanig, D., 2011, In : Journal of healthcare engineering. 2, 4, p. 487-508

Research output: Contribution to journalArticleResearchpeer-review

HF/UHF Dual Band RFID Transponders for an Information-Driven Public Transportation System

Zöscher, L., Spreitzer, R., Groß, H., Grosinger, J., Mühlmann, U., Amschl, D., Watzinger, H. & Bösch, W., 11 May 2016, In : e&i - Elektrotechnik und Informationstechnik. 133, 3, p. 163-175

Research output: Contribution to journalArticleResearchpeer-review

Human Computation for Constraint-based Recommenders

Ulz, T., Schwarz, M., Felfernig, A., Haas, S., Shehadeh, A., Reiterer, S. & Stettinger, M., 31 Dec 2016, In : Journal of Intelligent Information Systems. 1, 1, p. 1-21 21 p., 1.

Research output: Contribution to journalArticleResearchpeer-review

Identitätsmanagement in Österreich mit MOA-ID 2.0

Lenz, T., Zwattendorfer, B., Stranacher, K. & Tauber, A., 2014, In : eGovernment review. 13, p. 18-19

Research output: Contribution to journalArticleResearch

Open Access
File

Informatik und das Informatikstudium an der Technischen Universität Graz

Tochtermann, K., Posch, K-C. & Maurer, H., 2005, In : Telematik. 1, p. 4-6

Research output: Contribution to journalArticleResearch

Interactive Quality Analytics of User-generated Content: An Integrated Toolkit for the Case of Wikipedia

Sciascio, C. D., Strohmaier, D., Errecalde, M. & Veas, E., Apr 2019, In : ACM Transactions on Interactive Intelligent Systems . 9, 2-3, p. 1-42 42 p., 13.

Research output: Contribution to journalArticleResearchpeer-review

ISAP - Towards Side-Channel Secure Authenticated Encryption

Dobraunig, C. E., Eichlseder, M., Mangard, S., Mendel, F. & Unterluggauer, T., 2017, In : IACR Transactions on Symmetric Cryptology. 2017, 1, p. 80-105

Research output: Contribution to journalArticleResearchpeer-review

Open Access

ISAP v2.0

Dobraunig, C., Eichlseder, M., Mangard, S., Mendel, F., Mennink, B., Primas, R. & Unterluggauer, T., 2020, (Accepted/In press) In : IACR Transactions on Symmetric Cryptology. 2020, Special Issue

Research output: Contribution to journalArticleResearchpeer-review

Joint Reconstruction and Classification of Tumor Cells and Cell Interactions in Melanoma Tissue Sections with Synthesized Training Data

Effland, A., Kobler, E., Brandenburg, A., Klatzer, T., Neuhäuser, L., Hölzel, M., Landsberg, J., Pock, T. & Rumpf, M., 2019, In : International Journal of Computer Assisted Radiology and Surgery.

Research output: Contribution to journalArticleResearchpeer-review

Keeping Secrets on Low-Cost Chips

Mangard, S., 2013, In : IEEE security & privacy. 11, 4, p. 75-77

Research output: Contribution to journalArticleResearchpeer-review

Kernel Isolation: From an Academic Idea to an Efficient Patch for Every Computer

Gruss, D., Hansen, D. & Gregg, B., Dec 2018, In : ;login: the USENIX Magazine. 43, 4, p. 10-14 5 p.

Research output: Contribution to journalArticleResearch

Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge

Derler, D. & Slamanig, D., 2019, In : Designs, Codes, and Cryptography. 87, 6, p. 1373-1413

Research output: Contribution to journalArticleResearchpeer-review

Knowledge Extraction from RDF Data with Activation Patterns

Teufl, P. & Lackner, G., 2011, In : Journal of Universal Computer Science . 17, 7, p. 983-1004

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play)

Teufl, P., Ferk, M., Fitzek, A. G., Hein, D., Orthacker, C. & Kraxberger, S., 2013, In : Security and communication networks. p. 0-0

Research output: Contribution to journalArticleResearchpeer-review

Malware Guard Extension: abusing Intel SGX to conceal cache attacks

Schwarz, M., Weiser, S., Gruß, D., Maurice, C. L. N. & Mangard, S., 2020, In : Cybersecurity. 3, 20 p., 2.

Research output: Contribution to journalArticleResearchpeer-review

Open Access

Masked Dual-Rail Precharge Logic Encounters State-of-the-Art Power Analysis Methods

Moradi, A., Kirschbaum, M., Eisenbarth, T. & Paar, C., 2012, In : IEEE transactions on very large scale integration (VLSI) systems. 20, 9, p. 1578-1589

Research output: Contribution to journalArticleResearchpeer-review

MEAS: memory encryption and authentication secure against side-channel attacks

Unterluggauer, T., Werner, M. & Mangard, S., 25 Jan 2018, In : Journal of cryptographic engineering. p. 1-22

Research output: Contribution to journalArticleResearchpeer-review

Open Access

Meltdown

Lipp, M., Schwarz, M., Gruss, D., Prescher, T., Haas, W., Mangard, S., Kocher, P., Genkin, D., Yarom, Y. & Hamburg, M., 3 Jan 2018, In : arXiv.org e-Print archive.

Research output: Contribution to journalArticleResearch

Memoryless Near-Collisions, Revisited

Lamberger, M. & Teufl, E., 2013, In : Information Processing Letters. 113, 3, p. 60-66

Research output: Contribution to journalArticleResearchpeer-review

Memoryless Near-Collisions via Coding Theory

Lamberger, M., Mendel, F., Rijmen, V. & Simoens, K., 2012, In : Designs, codes and cryptography. 62, 1, p. 1-18

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

Middleware Architecture for Cross-Border Identification and Authentication

Zwattendorfer, B., Sumelong, I. & Leitold, H., 2013, In : Journal of Information Assurance and Security . 8, 2, p. 107-118

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

Mobile qualifizierte Signaturen in Europa

Zefferer, T., Teufl, P. & Leitold, H., 2011, In : Datenschutz und Datensicherheit. p. 768-773

Research output: Contribution to journalArticleResearch

Open Access
File

Nethammer: Inducing Rowhammer Faults through Network Requests

Lipp, M., Aga, M. T., Schwarz, M., Gruss, D., Maurice, C., Raab, L. & Lamster, L., 13 May 2018, In : arXiv.org e-Print archive. 10 p.

Research output: Contribution to journalArticleResearch

File

NetSpectre: Read Arbitrary Memory over Network

Schwarz, M., Schwarzl, M., Lipp, M. & Gruss, D., 27 Jul 2018, In : arXiv.org e-Print archive.

Research output: Contribution to journalArticleResearch

File

New criteria for linear maps in AES-like ciphers

Daemen, J. & Rijmen, V., 2009, In : Cryptography and communications. 1, 1, p. 47-69

Research output: Contribution to journalArticleResearchpeer-review

New Results on NMAC/HMAC when Instantiated with Popular Hash Functions

Rechberger, C. & Rijmen, V., 2008, In : Journal of Universal Computer Science . 14, 3, p. 347-376

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

Numerical solvers and cryptanalysis

Nad, T., Lamberger, M. & Rijmen, V., 2009, In : Journal of mathematical cryptology. 3, 3, p. 249-263

Research output: Contribution to journalArticleResearchpeer-review

On a family of singular measures related to Minkowski's ?(x) function

Lamberger, M., 2006, In : Indagationes mathematicae. 17, 1, p. 45-63

Research output: Contribution to journalArticleResearchpeer-review

One for all - all for one: unifying standard differential power analysis attacks

Mangard, S., Elisabeth, O. & Standaert, F-X., 2011, In : IET information security. p. 100-110

Research output: Contribution to journalArticleResearchpeer-review

Online-Vollmachten

Tauber, A., 2012, In : eGovernment review. 9, p. 16-17

Research output: Contribution to journalArticleResearch

On Measuring the Parasitic Backscatter of Sensor-enabled UHF RFID Tags

Plos, T. & Maierhofer, C., 2013, In : Information security technical report. p. 1-14

Research output: Contribution to journalArticleResearchpeer-review

On the Duality of Probing and Fault Attacks

Gammel, B. M. & Mangard, S., 2010, In : Journal of electronic testing. 26, 4, p. 483-493

Research output: Contribution to journalArticleResearchpeer-review

On the Feasibility of (Practical) Commercial Anonymous Cloud Storage

Pulls, T. & Slamanig, D., 2015, In : Transactions on data privacy. 8, 2, p. 89-111

Research output: Contribution to journalArticleResearch

Open Access
File

On the Security of RFID Devices against Implementation Attacks

Hutter, M., Plos, T. & Feldhofer, M., 2010, In : International journal of security and networks. 5, 2/3, p. 106-118

Research output: Contribution to journalArticleResearchpeer-review

Open Source für europäische Signaturen: Vertrauenswürdige Basis für die elektronische Signatur

Horsch, M., Derler, D., Rath, C., Haase, H-M. & Wich, T., 2014, In : Datenschutz und Datensicherheit. 38, 4, p. 237-241

Research output: Contribution to journalArticleResearch

Opportunities and Forthcoming Challenges of Smartphone-Based m-Government Services

Zefferer, T. & Teufl, P., 2011, (Submitted) In : Megatrends in eGovernment.

Research output: Contribution to journalArticleResearch