Publikationen

Video

Presse

  • Der Standard, Türöffner ins Internet der Dinge, 17.1.2014. [pdf]
  • FFG FOKUS: COMET-ZENTREN UND –PROJEKTE, Spitzenforschung für Österreichs Zukunft. [pdf]
  • Jasmin Grosinger, Wolfgang Bösch, Jörn-Marc Schmidt. Secure Contactless Sphere –
    Smarte RFID-Technologie für eine vernetzte Welt. TU-Graz Research 2013-1/9. [pdf]
  • RFID Journal, Microelectronics Technology Inc. and Enso Detego to Introduce FiND-iT RFID Solution at RFID Journal LIVE! 2013. [pdf]
  • SMS von Dusche an Toaster (Kleine Zeitung, 21.2.2013). [pdf]

Vorträge

  • Herwig Zeiner. Bausteine für RFID-Anwendungen. RFID Hotspot Steiermark: RFID & Eco-Tech. TAGnology (20.11.2014) [pdf]
  • Horst Pfluegl. RFID-Einsatz im automotiven Entwicklungsprozess. RFID Hotspot Steiermark: RFID & Mobility. JOANNEUM RESEARCH (18.9.2014) [pdf]
  • Michael Gadringer. Contactless Transmission Technology. RFIDeas 2014. JOANNEUM RESEARCH (21.5.2014) [pdf]
  • Raphael Spreitzer. Angriffsmöglichkeiten in RFID-Anwendungen. RFIDeas 2014. JOANNEUM RESEARCH (21.5.2014) [pdf]
  • Werner Haas. SeCoS smart, secure and healthy. RFID Hotspot Steiermark: RFID & Health, JOANNEUM RESEARCH (13.2.2014) [pdf]
  • Werner Haas. SeCoS: Secure Contactless Sphere. RFIDeas 2013: F&E und Wirtschaft in Kooperation. (7.10.2013) [pdf]
  • Wolfgang Bösch. SeCoS: Secure Contactless Sphere. USRI Meeting Austria. (27.6.2013) [pdf]
  • Werner Haas. SeCoS: Secure Contactless Sphere. RFID Hotspot Steiermark. Infineon AG. (22.1.2013) [pdf]

Wissenschaftliche Publikationen

  • Raphael Spreitzer, Thomas Plos. On the Applicability of Time-Driven Cache Attacks on Mobile Devices. Network and System Security – NSS 2013, 7th International Conference, Madrid, Spain, June 3-4, 2013, Proceedings.
    http://dx.doi.org/10.1007/978-3-642-38631-2_53
  • J. Grosinger, W. Bösch, and J.-M. Schmidt, “Secure Contactless Sphere – Smart RFID-Technologies for a Connected World,” TU Graz Research, vol. 2013-1, no. 9, pp. 13-15, 2013.
  • Raphael Spreitzer, Thomas Plos: On the Applicability of Time-Driven Cache Attacks on Mobile Devices (Extended Version). Cryptology ePrint Archive, Report 2013/172, 2013.
  • C. Saminger, M. Stark, M. Gebhart, S. Grünberger, J. Langer, Introduction of very high bitrates for NFC and RFID, e&i Elektrotechnik und Informationstechnik Vol. 130/Issue 7 (Nov. 2013)
  • Herwig Zeiner, Werner Haas. NFC in the K-Project Secure Contactless Sphere—smart RFID technologies for a connected world. e & i Elektrotechnik und Informationstechnik, 2013, DOI:10.1007/s00502-013-0155-z. [Web]
  • Stefan Kölbl, Florian Mendel, Tomislav Nad, Martin Schläffer.
    Differential Cryptanalysis of Keccak Variants.
    Cryptography and Coding, IMA International Conference on Cryptography and Coding, Oxford, UK, December 17-19, 2013. Proceedings.
    http://dx.doi.org/10.1007/978-3-642-45239-0_9
  • Erich Wenger, Thomas Korak, Mario Kirschbaum.
    Analyzing Side-Channel Leakage of RFID-Suitable Lightweight ECC Hardware. RFID Security – RFIDSec 2013, 9th Workshop, Graz, Austria, July 9-11, 2013. Proceedings.
    http://link.springer.com/chapter/10.1007/978-3-642-41332-2_9
  • Begul Bilgin, Andrey Bogdanov, Miroslav Knezevic, Florian Mendel, Qingju Wang.
    FIDES: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware.
    Cryptographic Hardware and Embedded Systems – CHES 2013, Santa Barbara, USA, August 20-23, 2013. Proceedings.
    http://dx.doi.org/10.1007/978-3-642-40349-1_9
  • Mendel, F.; Rijmen, V.; Schläffer, M.: Collision Attack on 5 Rounds of Grøstl. Published in Fast Software Encryption 2014.
    Korak, T.; Hutter, M.: On the Power of Active Relay Attacks using Custom-Made Proxies.Published in IEEE International Conference on RFID 2014.
  • Freidl, P. F.; Gadringer, M. E.; Bösch, W.: Measurement of MM-Wave Identification (MMID) Downlink Channels. – in: Proceedings of the Microelectronic Systems Symposium 2014. (2014), S. 1 – 5
  • Freidl, P. F.; Khan, H. N.; Gadringer, M. E.; Bösch, W.: Measurements and Analysis of MM-Wave RFID Channels. – in: Proceedings of the 2014 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom). (2014), S. 88 – 91
  • Liu, Z.; Wenger, E.; Großschädl, J.: MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks.Published in Applied Cryptography and Network Security 2014.
  • Spreitzer, R.; Gérard, B.: Towards More Practical Time-Driven Cache Attacks. Published in Information Security Theory and Practice 2014.
  • Groß, H.; Wenger, E.; Martín, H.; Hutter, M.: PIONEER – a Prototype for the Internet of Things based on an Extendable EPC Gen2 RFID Tag. Published in Workshop on RFID Security 2014.
  • Peßl, P.; Hutter, M.: Curved Tags – A Low-Resource ECDSA Implementation tailored for RFID. Published in Workshop on RFID Security 2014.
  • Korak, T.; Plos, T.: EM Leakage of RFID Devices – Comparison of Two Measurement Approaches.Published in Conference on Availability, Reliability and Security 2014.
  • W. Pachler, J. Grosinger, W. Bösch, G. Holweg, and C. Steffan, “A Miniaturized Dual Band RFID Tag,” in Proc. IEEE RFID-Technology and Applications, September 2014.
  • P. Freidl, M. Gadringer and W. Bösch, “Design of a mm-wave RFID demonstrator”, 2nd Workshop of the Radio Frequency Engineering Working Group of the Austrian Research Association, October 2014.
  • A. Jonjic and W. Bösch, „A Security and NFC Enhanced Wireless Sensor Network Node,” 2nd Workshop of the Radio Frequency Engineering Working Group of the Austrian Research Association, October 2014.
  • L. Zöscher, J. Grosinger, H. Watzinger and W. Bösch, “The Evolution of Passive UHF RFID Frontends,” 2nd Workshop of the Radio Frequency Engineering Working Group of the Austrian Research Association, Linz, October 2014.
  • H. Zeiner and S. Russeger, NFC – IN THE USE FOR CULTURE 2.0, Conference on Cultural Heritage and New Technologies, Wien, 2014
  • A. Jonjic, J. Grosinger, W. Bösch, T. Herndl, R. Matischek, and G. Holweg, “A Security and NFC Enhanced Wireless Sensor Network Node,” in Proc. IEEE Sensors, November 2014.
    Spreitzer, R.: PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices. Published in Security and Privacy in Smartphones and Mobile Devices 2014.
  • E. Andreeva, B. Bilgin, A. Bogdanov, A. Luykx, F. Mendel, B. Mennink, N. Mouha, K- Yasuda and Q. Wang, PRIMATEs, CAESAR Submission 2014
  • W. Haas, H. Zeiner, M. Goller und M. Karner, “Contactless Technologies for the Industry – Examples from the K-Project SeCoS,” 15th International Conference On Knowledge Technologies and Data-Driven Business (Smart Production-Track). 2014
  • C. Dobraunig, M. Eichlseder, F. Mendel and M. Schläffer, ASCON, CAESAR Submission 2014
  • L. Zöscher, J. Grosinger, U. Muehlmann, H. Watzinger, and W. Bösch, „RF Voltage Limiters for Passive Differential UHF RFID Front-Ends in a 40nm CMOS Technology,“ accepted at the International Microwave Symposium, May 2015.
  • A. Jonjic, J. Grosinger, T. Herndl, G. Holweg, and W. Bösch, “A Secure Miniaturized Wireless Sensor Node for a Smart Home Demonstrator,” accepted at the International Microwave Symposium, May 2015.
  • C. Dobraunig, M. Eichlseder, F. Mendel: “Forgery Attacks on round-reduced ICEPOLE-128”. (SAC 2015)
  • C. Dobraunig, M. Eichlseder, F. Mendel, and M. Schläffer – “Cryptanalysis of Ascon”. (CT-RSA 2015)
  • C. Dobraunig, M. Eichlseder, and F. Mendel – “Related-Key Forgeries for Proest-OTR”. (FSE 2015)
  • M. Mühlberghuber, T. Korak, M. Hutter – “Towards Evaluating DPA Countermeasures for KECCAK on a Real ASIC”. (COSADE 2015)
  • H. Gross: “Sharing is Caring – On the Protection of Arithmetic Logic Units against Passive Physical Attacks”. (RFIDsec 2015)
  • D. Gruss, R. Spreitzer, S. Mangard: “Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches”. (USENIX Security 2015)
  • H. Gross, E. Wenger, C. Dobraunig, C. Ehrenhöfer: “Suit up!
    Made-to-Measure Hardware Implementations of ASCON”. (DSD 2015)
  • D. Gruss, D. Bidner, S. Mangard: “Practical Memory Deduplication Attacks in Sandboxed Javascript”. (ESORICS 2015)
  • C. Dobraunig, M. Eichlseder, F. Mendel: “Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates”. (ASIACRYPT 2015)
  • C. Dobraunig, M. Eichlseder, F. Mendel: “Analysis of SHA-512/224 and SHA-512/256”. (ASIACRYPT 2015)
  • H. Gross, M. Hölbl, D. Slamanig, R. Spreitzer: “Privacy-Aware Authentication in the Internet of Things.” (CANS 2015)
  • C. Dobraunig, M. Eichlseder, F. Mendel: “Higher-Order Cryptanalysis of LowMC” (ICISC 2015)
  • O. Blazy, D. Derler, D. Slamanig, R. Spreitzer: “Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability” (CT-RSA 2016)