Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output

Filter
Article
Article

The NIST Cryptographic Workshop on Hash Functions

Rechberger, C., Rijmen, V. & Sklavos, N., 2006, In : IEEE security & privacy. 4, 1, p. 54-56

Research output: Contribution to journalArticleResearchpeer-review

The Public Cloud for e-Government

Zwattendorfer, B. & Tauber, A., 2013, In : International journal of distributed systems and technologies. 4, 4, p. 1-14

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

The Rebound Attack and Subspace Distinguishers: Application to Whirlpool

Lamberger, M., Mendel, F., Rechberger, C., Rijmen, V. & Schläffer, M., 2015, In : Journal of cryptology. 28, 2, p. 257-296 40 p.

Research output: Contribution to journalArticleResearchpeer-review

The second reactive synthesis competition (SYNTCOMP 2015)

Jacobs, S., Bloem, R., Brenguier, R., Pérez, G. A., Raskin, J. F., Ryzhyk, L., Sankur, O., Seidl, M., Tentrup, L., Walker, A. & Könighofer, R., 2 Feb 2016, In : Electronic Proceedings in Theoretical Computer Science. 202, p. 27-57 31 p.

Research output: Contribution to journalArticleResearchpeer-review

Touch’n Trust: An NFC-Enabled Trusted Platform Module

Hutter, M. & Tögl, R., 2011, In : International Journal on Advances in Security . 4, 1/2, p. 131-141

Research output: Contribution to journalArticleResearch

Towards a Virtual Trusted Platform

Pirker, M. & Tögl, R., 2010, In : Journal of Universal Computer Science . 16, 4, p. 531-542

Research output: Contribution to journalArticleResearchpeer-review

Towards Secure Mobile Computing: Employing Power-Consumption Information to Detect Malware on Mobile Devices

Zefferer, T., Teufl, P., Derler, D., Potzmader, K., Oprisnik, A., Gasparitz, H. & Höller, A., 2014, (Submitted) In : International journal on advances in software. 7 (2014), 1&2

Research output: Contribution to journalArticleResearch

Using Bleichenbacher's Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA: Extended Version

De Mulder, E., Hutter, M., Marson, M. & Pearson, P., 2014, In : Journal of cryptographic engineering. 4, 1, p. 33-45

Research output: Contribution to journalArticleResearchpeer-review

Variational 3D-PIV with sparse descriptors

Lasinger, K., Vogel, C., Schindler, K. & Pock, T., 10 May 2018, In : Measurement science & technology. 29, 6, 14 p., 064010.

Research output: Contribution to journalArticleResearchpeer-review

Verification and Fault Localization for VHDL Programs

Bloem, R. P. & Wotawa, F., 2002, In : Telematik. 8, 2, p. 30-33

Research output: Contribution to journalArticleResearch

Vollständigkeitsnachweis für Daten im Cloud Computing

Slamanig, D. & Stingl, C., 2012, In : Datenschutz und Datensicherheit. 36, 7, p. 510-514

Research output: Contribution to journalArticleResearch

Whirlwind: a new cryptographic hash function

Barreto, P., Nikov, V., Nikova, S., Rijmen, V. & Tischhauser, E., 2010, In : Designs, codes and cryptography. 56, p. 141-162

Research output: Contribution to journalArticleResearchpeer-review

Wireless LAN MAC-Layer Address Spoofing with Fingerprinting Methods

Lackner, G., Payer, U. & Teufl, P., 2009, In : International journal of network security. Vol. 9, No. 2, p. 164-172

Research output: Contribution to journalArticleResearch

Zero-correlation attacks on tweakable block ciphers with linear tweakey expansion

Ankele, R., Dobraunig, C., Guo, J., Lambooij, E., Leander, G. & Todo, Y., 19 Mar 2019, In : IACR Transactions on Symmetric Cryptology. 2019, 1, p. 192-235 44 p.

Research output: Contribution to journalArticleResearchpeer-review