Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output 1983 2019

Filter
Doctoral Thesis

Analysis of Cryptographic Hash Functions

Mendel, F., 2010

Research output: ThesisDoctoral ThesisResearch

A New Approach for a Public-Key Infrastructure

Scheibelhofer, K., 2007

Research output: ThesisDoctoral ThesisResearch

Controller Synthesis with Uninterpreted Functions

Hofferek, G., 2014

Research output: ThesisDoctoral ThesisResearch

Open Access
File
Open Access
File

Cryptanalysis and Design of Iterated Hash Functions

Pramstaller, N., 2007

Research output: ThesisDoctoral ThesisResearch

Cryptanalysis of AES-Based Hash Functions

Schläffer, M., 2011

Research output: ThesisDoctoral ThesisResearch

Open Access
File

Cryptanalysis of Hash Functions

Rechberger, C., 2009

Research output: ThesisDoctoral ThesisResearch

Differential Cryptanalysis of Symmetric Primitives

Eichlseder, M., 2018, 291 p.

Research output: ThesisDoctoral ThesisResearch

Open Access
File

Domain-Oriented Masking: Generically Masked Hardware Implementations

Groß, H., 2018, 173 p.

Research output: ThesisDoctoral ThesisResearch

File
Hardware
Formal methods
Costs

Efficient and Practical Protocols for Privacy in Cloud Computing

Slamanig, D., 2011

Research output: ThesisDoctoral ThesisResearch

Electronic Voting over the Internet - an E-Government Speciality

Rössler, T. G., 2007

Research output: ThesisDoctoral ThesisResearch

Open Access
File

Enhancements for Group Signatures and Side-Channel Attacks on Mobile Devices

Spreitzer, R., 10 May 2017

Research output: ThesisDoctoral ThesisResearch

Hardware Aspects of Elliptic Curve Cryptography

Wolkerstorfer, J., 2004

Research output: ThesisDoctoral ThesisResearch

Implementation Attacks - Manipulating Devices to Reveal Their Secrets

Schmidt, J-M., 2009

Research output: ThesisDoctoral ThesisResearch

Instruction Set Extensions for Support of Cryptography on Embedded Systems

Tillich, S., 2008

Research output: ThesisDoctoral ThesisResearch

Open Access
File

Interoperability of Electronic Documents

Stranacher, K., 2014

Research output: ThesisDoctoral ThesisResearch

Low-Power Hardware Design of Cryptographic Algorithms for RFID Tags

Feldhofer, M., 2008

Research output: ThesisDoctoral ThesisResearch

On Trusted Computing Interfaces

Tögl, R., 2013

Research output: ThesisDoctoral ThesisResearch

Power Analysis Resistant Logic Styles - Design, Implementation, and Evaluation

Kirschbaum, M., 2011

Research output: ThesisDoctoral ThesisResearch

Probabilistic and dynamical properties of number systems

Lamberger, M., 2002

Research output: ThesisDoctoral ThesisResearch

Protecting Security-Aware Devices Against Implementation Attacks

Medwed, M., 2010

Research output: ThesisDoctoral ThesisResearch

Open Access
File

Satisfiability-Based Methods for Controller Synthesis

Könighofer, R., 2015

Research output: ThesisDoctoral ThesisResearch

Open Access
File

Secure and Efficient Elliptic Curve Cryptography for Embedded Environments

Wenger, E., 2013

Research output: ThesisDoctoral ThesisResearch

Secure and Efficient Implementation of RFID Tags Supporting Cryptography

Hutter, M., 2011

Research output: ThesisDoctoral ThesisResearch

Secure passive RFID technology in the Internet of Things

Aigner, M. J., 2010

Research output: ThesisDoctoral ThesisResearch

Secure RFID Applications for the Internet of Things

Dominikus, S., 2012

Research output: ThesisDoctoral ThesisResearch

Securing Implementations of Block Ciphers against Side-Channel Attacks

Mangard, S., 2004

Research output: ThesisDoctoral ThesisResearch

Security Aspects of Low-Cost RFID Tags - From Evaluation to Hardware Implementation

Plos, T., 2011

Research output: ThesisDoctoral ThesisResearch

Side-Channel Analysis Attacks and Countermeasures - An Embedded-Software Developers View

Herbst, C., 2009

Research output: ThesisDoctoral ThesisResearch

Signatures on Equivalence Classes: A New Tool for Privacy-Enhancing Cryptography

Hanser, C., Feb 2016, 191 p.

Research output: ThesisDoctoral ThesisResearch

Equivalence classes
Cryptography
Data privacy
Electronic document identification systems
Communication

Software-based Microarchitectural Attacks

Gruss, D., 14 Jun 2017

Research output: ThesisDoctoral ThesisResearch

Open Access
File

Tools in the Cryptanalysis of Symmetric Primitives

Nad, T., 2012

Research output: ThesisDoctoral ThesisResearch