explore Our
Publications
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Nad T., Mendel F., Schläffer M.
Applied Cryptography and Network Security. ACNS 2009, 7th International Conference on Applied Cryptography and Network Security, 369-381, (Lecture Notes in Computer Science; vol. 5536)
Nad T., Mendel F.
Progress in Cryptology - INDOCRYPT 2009, 10th International Conference on Cryptology in India, 219-232, (Lecture Notes in Computer Science; vol. 5922)
Tögl R., Hofferek G., Greimel K., Leung A., Phan R., Bloem R.
International Symposium on Trusted Computing (TrustCom 2008) Proceedings, in 9th ICYCS Conference Proceedings, International Symposium on Trusted Computing, 2289-2294
Suelflow A., Fey G., Bloem R., Drechsler R.
Methoden und Beschreibungssprachen zur Modellierung und Verifikation von Schaltungen und Systemen, Workshop Methoden und Beschreibungssprachen zur Modellierung und Verifikation von Schaltungen und Systemen, 159-168
Lamberger M., Pramstaller N., Rechberger C., Rijmen V.
IEEE Transactions on Information Theory, Vol. 54(8), 3647-3655
Rechberger C., Rijmen V.
Journal of Universal Computer Science , Vol. 14(3), 347-376
Aumasson J., Fischer S., Khazaei S., Meier W., Rechberger C.
Fast Software Encryption Workshop, Springer, 470-488
Hölbl M., Rechberger C., Welzer T.
Proceedings of Western European Workshop on Research in Cryptology, Western European Workshop on Research in Cryptology, 28-38, (Lecture notes in computer science)
Fey G., Staber S., Bloem R., Drechsler R.
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Vol. 27(6), 1138-1149
Greimel K., Bloem R., Jobstmann B., Vardi M.
Automata, Languages and Programming - ICALP 2008, 2008 International Colloquium on Automata, Languages and Programming, 361-372, (Lecture Notes in Computer Science; vol. 5126)
Suelflow A., Fey G., Bloem R., Drechsler R.
GLSVLSI '08: Proceedings of the 18th ACM Great Lakes symposium on VLSI, 18th ACM Great Lakes Symposium on VLSI, 77-82
Schmidt J., Herbst C.
5th Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2008, Fault Diagnosis and Tolerance in Cryptography, 53-58
Mendel F., Pramstaller N., Rechberger C.
Fast Software Encryption. FSE 2008, 2008 Fast Software Encryption Workshop, 224-234, (Lecture Notes in Computer Science; vol. 5086)
Käsper E., Rijmen V., Bjørstad T., Rechberger C., Robshaw M., Sekar G.
Progress in Cryptology – AFRICACRYPT 2008, 1st International Conference on Cryptology in Africa, 246-257, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5023 LNCS)
Indesteege S., Mendel F., Preneel B., Rechberger C.
Selected Areas in Cryptography, 15th Annual Workshop on Selected Areas in Cryptography, 276-293, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5381 LNCS)
De Cannière C., Rechberger C.
Advances in Cryptology - Proceedings CRYPTO 2008, 28th Annual International Cryptology Conference, 179-202, (Lecture Notes in Computer Science; vol. 5157)
Mendel F., Pramstaller N., Rechberger C., Kontak M., Szmidt J.
Advances in Cryptology - Proceedings CRYPTO 2008, 28th Annual International Cryptology Conference, 162-178, (Lecture Notes in Computer Science; vol. 5157)
Tillich S., Herbst C.
Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, 170-186, (Lecture Notes in Computer Science; vol. 4964)