Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output

Filter
Article
2011

Health Records and the Cloud Computing Paradigm from a Privacy Perspective

Stingl, C. & Slamanig, D., 2011, In : Journal of healthcare engineering. 2, 4, p. 487-508

Research output: Contribution to journalArticleResearchpeer-review

Knowledge Extraction from RDF Data with Activation Patterns

Teufl, P. & Lackner, G., 2011, In : Journal of Universal Computer Science . 17, 7, p. 983-1004

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

Mobile qualifizierte Signaturen in Europa

Zefferer, T., Teufl, P. & Leitold, H., 2011, In : Datenschutz und Datensicherheit. p. 768-773

Research output: Contribution to journalArticleResearch

Open Access
File

One for all - all for one: unifying standard differential power analysis attacks

Mangard, S., Elisabeth, O. & Standaert, F-X., 2011, In : IET information security. p. 100-110

Research output: Contribution to journalArticleResearchpeer-review

Opportunities and Forthcoming Challenges of Smartphone-Based m-Government Services

Zefferer, T. & Teufl, P., 2011, (Submitted) In : Megatrends in eGovernment.

Research output: Contribution to journalArticleResearch

Redigierbare Digitale Signaturen: Theorie und Praxis

Slamanig, D. & Rass, S., 2011, In : Datenschutz und Datensicherheit. 35, 11, p. 757-762

Research output: Contribution to journalArticleResearch

Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches

Nikova, S., Rijmen, V. & Schläffer, M., 2011, In : Journal of cryptology. 24, 2, p. 292-321

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

Touch’n Trust: An NFC-Enabled Trusted Platform Module

Hutter, M. & Tögl, R., 2011, In : International Journal on Advances in Security . 4, 1/2, p. 131-141

Research output: Contribution to journalArticleResearch

2010

An Autonomous Attestation Token to Secure Mobile Agents in Disaster Response

Hein, D., Tögl, R. & Kraxberger, S., 2010, In : Security and communication networks. 3, 5, p. 421-438

Research output: Contribution to journalArticleResearchpeer-review

A Trusted Computing Identity Collation Protocol to Simplify Deployment of New Disaster Response Devices

Danner, P. & Hein, D., 2010, In : Journal of Universal Computer Science . 16, 9, p. 1139-1151

Research output: Contribution to journalArticleResearchpeer-review

Electronic Voting Using Identity Domain Separation and Hardware Security Modules

Rössler, T., 2010, In : International journal of e-adoption. 2, 1, p. 30-44

Research output: Contribution to journalArticleResearchpeer-review

On the Duality of Probing and Fault Attacks

Gammel, B. M. & Mangard, S., 2010, In : Journal of electronic testing. 26, 4, p. 483-493

Research output: Contribution to journalArticleResearchpeer-review

On the Security of RFID Devices against Implementation Attacks

Hutter, M., Plos, T. & Feldhofer, M., 2010, In : International journal of security and networks. 5, 2/3, p. 106-118

Research output: Contribution to journalArticleResearchpeer-review

Privatzustellung – Der elektronisch eingeschriebene Brief

Tauber, A. & Reichstädter, P., 2010, In : eGovernment review. 5, p. 18-19

Research output: Contribution to journalArticleResearch

Reconstruction of electronic signatures from eDocument printouts

Leitold, H., Posch, R. & Rössler, T., 2010, In : Computers & Security. 29, 5, p. 523-532

Research output: Contribution to journalArticleResearchpeer-review

Refinements of the Alred construction and MAC security claims

Daemen, J. & Rijmen, V., 2010, In : IET information security. 4;3, p. 149-157

Research output: Contribution to journalArticleResearchpeer-review

Requirements and Properties of Qualified Electronic Delivery Systems in eGovernment – an Austrian Experience

Tauber, A., 2010, In : International journal of e-adoption. 2, 1, p. 44-56

Research output: Contribution to journalArticleResearchpeer-review

Stream ciphers and the eSTREAM project

Rijmen, V., 2010, In : The ISC international journal of information security. 2, 1, p. 3-11

Research output: Contribution to journalArticleResearch

Towards a Virtual Trusted Platform

Pirker, M. & Tögl, R., 2010, In : Journal of Universal Computer Science . 16, 4, p. 531-542

Research output: Contribution to journalArticleResearchpeer-review

Whirlwind: a new cryptographic hash function

Barreto, P., Nikov, V., Nikova, S., Rijmen, V. & Tischhauser, E., 2010, In : Designs, codes and cryptography. 56, p. 141-162

Research output: Contribution to journalArticleResearchpeer-review

2009

Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers

Daemen, J., Lamberger, M., Pramstaller, N., Rijmen, V. & Vercauteren, F., 2009, In : Computing <Wien>. 85, 1-2, p. 85-104

Research output: Contribution to journalArticleResearchpeer-review

Elektronische Vollmachten im österreichischen E-Government

Tauber, A. & Rössler, T., 2009, In : eGovernment review. 4, p. 22-23

Research output: Contribution to journalArticleResearch

Green cryptography: cleaner engineering through recycling

Rijmen, V. & Troutman, J., 2009, In : IEEE security & privacy. 7, 4, p. 71-73

Research output: Contribution to journalArticleResearchpeer-review

Green cryptography: cleaner engineering through recycling, Part 2

Rijmen, V. & Troutman, J., 2009, In : IEEE security & privacy. 7, 5, p. 64-65

Research output: Contribution to journalArticleResearchpeer-review

New criteria for linear maps in AES-like ciphers

Daemen, J. & Rijmen, V., 2009, In : Cryptography and communications. 1, 1, p. 47-69

Research output: Contribution to journalArticleResearchpeer-review

Numerical solvers and cryptanalysis

Nad, T., Lamberger, M. & Rijmen, V., 2009, In : Journal of mathematical cryptology. 3, 3, p. 249-263

Research output: Contribution to journalArticleResearchpeer-review

Performance Optimizations for DAA Signatures on Java enabled Platforms

Dietrich, K. & Röck, F., 2009, In : Journal of Universal Computer Science . p. xxx-xxx

Research output: Contribution to journalArticleResearchpeer-review

Wireless LAN MAC-Layer Address Spoofing with Fingerprinting Methods

Lackner, G., Payer, U. & Teufl, P., 2009, In : International journal of network security. Vol. 9, No. 2, p. 164-172

Research output: Contribution to journalArticleResearch

2008

Analysis of the Hash Function Design Strategy called SMASH

Lamberger, M., Pramstaller, N., Rechberger, C. & Rijmen, V., 2008, In : IEEE transactions on information theory. 54, 8, p. 3647-3655

Research output: Contribution to journalArticleResearchpeer-review

Area, Delay, and Power Characteristics of Standard-Cell Implementations of the AES S-Box

Tillich, S., Feldhofer, M., Popp, T. & Großschädl, J., 2008, In : Journal of Signal Processing Systems. 50, 2, p. 251-261

Research output: Contribution to journalArticleResearchpeer-review

Automatic Fault Localization for Property Checking

Fey, G., Staber, S. S., Bloem, R. P. & Drechsler, R., 2008, In : IEEE transactions on computer-aided design of integrated circuits and systems. 27, 6, p. 1138-1149

Research output: Contribution to journalArticleResearchpeer-review

Differential Side Channel Analysis Attacks on FPGA Implementations of ARIA

Kim, C., Schläffer, M. & Moon, S., 2008, In : ETRI Journal. 30, 2, p. 315-325

Research output: Contribution to journalArticleResearchpeer-review

Open Access

EU-Projekt "eGov-Bus"

Stranacher, K., Zwattendorfer, B. & Orthacker, C., 2008, In : eGovernment review. 1, 2, p. 8-9

Research output: Contribution to journalArticleResearch

Open Access
File

FutureLabs@Informatik.TUGraz

Posch, K-C., 2008, In : Forschungsjournal der Technischen Universität Graz. p. 38-41

Research output: Contribution to journalArticleResearch

Giving an interoperable e-ID solution: Using foreign e-IDs in Austrian e-Government

Rössler, T., 2008, In : The Computer law and security report. 24, 5, p. 447-453

Research output: Contribution to journalArticleResearchpeer-review

New Results on NMAC/HMAC when Instantiated with Popular Hash Functions

Rechberger, C. & Rijmen, V., 2008, In : Journal of Universal Computer Science . 14, 3, p. 347-376

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

Privacy-enhancing methods for e-health applications: how to prevent statistical analyses and attacks

Stingl, C. & Slamanig, D., 2008, In : International journal of business intelligence and data mininig. 37, 3, p. 236-254

Research output: Contribution to journalArticleResearchpeer-review

Rotation symmetry in algebraically generated cryptographic substitution tables

Rijmen, V., Barreto, P. S. L. M. & Filho, D. G., 2008, In : Information Processing Letters. 106, 6, p. 246-250

Research output: Contribution to journalArticleResearchpeer-review

2007

Can you Really Trust your Computer Today?

Dietrich, K., Vejda, T., Tögl, R. G., Pirker, M. & Lipp, P., 2007, In : ENISA quarterly. 3, 3, p. 8-9

Research output: Contribution to journalArticleResearch

Open Access
File

Plateau characteristics

Daemen, J. & Rijmen, V., 2007, In : IET information security. 1, 1, p. 11-18

Research output: Contribution to journalArticleResearchpeer-review

Power Analysis Attacks and Countermeasures

Popp, T., Mangard, S. & Oswald, M. E., 2007, In : IEEE design & test of computers. 24, 6, p. 535-543

Research output: Contribution to journalArticleResearchpeer-review

PROACT: RFID-Impulse an der TU Graz

Wolkerstorfer, J. & Hollaus, K., 2007, In : e&i - Elektrotechnik und Informationstechnik. 11, p. a17-a18

Research output: Contribution to journalArticleResearchpeer-review

Probability distributions of correlations and differentials in block ciphers

Daemen, J. & Rijmen, V., 2007, In : Journal of mathematical cryptology. 1, 3, p. 221-242

Research output: Contribution to journalArticleResearchpeer-review

2006

On a family of singular measures related to Minkowski's ?(x) function

Lamberger, M., 2006, In : Indagationes mathematicae. 17, 1, p. 45-63

Research output: Contribution to journalArticleResearchpeer-review

PROACT und E-Government-Innovationszentrum: Zwei neue Initiativen an der TU Graz

Posch, K-C., 2006, In : Forschungsjournal der Technischen Universität Graz. WS 05/06, p. 18-19

Research output: Contribution to journalArticleResearch

The NIST Cryptographic Workshop on Hash Functions

Rechberger, C., Rijmen, V. & Sklavos, N., 2006, In : IEEE security & privacy. 4, 1, p. 54-56

Research output: Contribution to journalArticleResearchpeer-review

2005

AES Implementation on a Grain of Sand

Feldhofer, M., Wolkerstorfer, J. & Rijmen, V., 2005, In : IEE proceedings / information security. 152, 1, p. 13-20

Research output: Contribution to journalArticleResearchpeer-review

Handhelds sicher nutzen

Dietrich, K., 2005, In : Kommune 21. 3, p. 68-69

Research output: Contribution to journalArticleResearch