explore Our
Publications
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Bloem R., Greimel K., Henzinger T., Jobstmann B.
Proceedings of 9th International Conference on Formal Methods in Computer-Aided Design, FMCAD 2009, 85-92
Stranacher K., Tauber A., Rössler T.
Arbeitskonferenz DACH Security, 263-272
Könighofer R., Hofferek G., Bloem R.
Proceedings of 9th International Conference 2009 Formal Methods in Computer Aided Design FMCAD 2009, 9th International Conference Formal Methods in Computer Aided Design, 152-159
Rössler T., Tauber A.
Proceedings of the 8th International Conference on Ongoing Research, General Development Issues and Projects of Electronic Government (EGOV 09), Eighth International Conference EGOV 2008, 247-254, (Schriftenreihe Informatik)
Tauber A., Rössler T.
Proceedings of the 8th International Conference EGOV 2009, Eighth International Conference EGOV 2009, 388-398, (Lecture Notes in Computer Science (LNCS))
Tauber A.
Software Services for e-Business and e-Society: Proceedings of the 9th IFIP WG6.1 Conference, 9th IFIP WG 6.1 Conference on e-Business, e-Services and e-Society, I3E 2009, 123-133, (IFIP AICT)
Posch R., Georg L., Frefel C., Hämmerli B., Liebenau J., Kärrberg P.
, Detecon
Herbst C.
, Doctoral Thesis
Herbst C., Medwed M.
9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers, WISA - Workshop on Information Security Applications, 1-13, (Lecture Notes in Computer Science)
Nad T., Lamberger M., Rijmen V.
Journal of Mathematical Cryptology, Vol. 3(3), 249-263
Mendel F., Rechberger C., Schläffer M., Thomsen S.
Fast Software Encryption. FSE 2009, 16th International Fast Software Encryption Workshop, 260-276, (Lecture Notes in Computer Science; vol. 5665)
Mendel F., Rechberger C., Schläffer M.
Advances in Cryptology - ASIACRYPT 2009, 2009 International Conference on the Theory and Application of Cryptology and Information Security, 144-161, (Lecture Notes in Computer Science; vol. 5912)
Mendel F., Peyrin T., Rechberger C., Schläffer M.
Selected Areas in Cryptography. SAC 2009, International Workshop on Selected Areas in Cryptography, 16-35, (Lecture Notes in Computer Science; vol. 5867)
Nad T., Mendel F., Schläffer M.
Applied Cryptography and Network Security. ACNS 2009, 7th International Conference on Applied Cryptography and Network Security, 369-381, (Lecture Notes in Computer Science; vol. 5536)
Nad T., Mendel F.
Progress in Cryptology - INDOCRYPT 2009, 10th International Conference on Cryptology in India, 219-232, (Lecture Notes in Computer Science; vol. 5922)
Tögl R., Hofferek G., Greimel K., Leung A., Phan R., Bloem R.
International Symposium on Trusted Computing (TrustCom 2008) Proceedings, in 9th ICYCS Conference Proceedings, International Symposium on Trusted Computing, 2289-2294
Suelflow A., Fey G., Bloem R., Drechsler R.
Methoden und Beschreibungssprachen zur Modellierung und Verifikation von Schaltungen und Systemen, Workshop Methoden und Beschreibungssprachen zur Modellierung und Verifikation von Schaltungen und Systemen, 159-168
Lamberger M., Pramstaller N., Rechberger C., Rijmen V.
IEEE Transactions on Information Theory, Vol. 54(8), 3647-3655