Der Standard, Türöffner ins Internet der Dinge, 17.1.2014. [pdf]
FFG FOKUS: COMET-ZENTREN UND –PROJEKTE, Spitzenforschung für Österreichs Zukunft. [pdf]
Jasmin Grosinger, Wolfgang Bösch, Jörn-Marc Schmidt. Secure Contactless Sphere –
Smarte RFID-Technologie für eine vernetzte Welt. TU-Graz Research 2013-1/9. [pdf]
RFID Journal, Microelectronics Technology Inc. and Enso Detego to Introduce FiND-iT RFID Solution at RFID Journal LIVE! 2013. [pdf]
SMS von Dusche an Toaster (Kleine Zeitung, 21.2.2013). [pdf]
Presentations
Herwig Zeiner. Bausteine für RFID-Anwendungen. RFID Hotspot Styria: RFID & Eco-Tech. TAGnology (20.11.2014) [pdf]
Horst Pfluegl. RFID-Einsatz im automotiven Entwicklungsprozess. RFID Hotspot Styria: RFID & Mobility. JOANNEUM RESEARCH (18.9.2014) [pdf]
Michael Gadringer. Contactless Transmission Technology. RFIDeas 2014. JOANNEUM RESEARCH (21.5.2014) [pdf]
Raphael Spreitzer. Angriffsmöglichkeiten in RFID-Anwendungen. RFIDeas 2014. JOANNEUM RESEARCH (21.5.2014) [pdf]
Werner Haas. SeCoS smart, secure and healthy. RFID Hotspot Steiermark: RFID & Health. JOANNEUM RESEARCH (13.2.2014) [pdf]
Werner Haas. SeCoS: Secure Contactless Sphere. RFID Hotspot Styria. Infineon AG. (22.1.2013)[pdf]
Werner Haas. SeCoS: Secure Contactless Sphere. RFIDeas 2013: F&E und Wirtschaft in Kooperation. (7.10.2013) [pdf]
Scientific Publications
Raphael Spreitzer, Thomas Plos. On the Applicability of Time-Driven Cache Attacks on Mobile Devices. Network and System Security – NSS 2013, 7th International Conference, Madrid, Spain, June 3-4, 2013, Proceedings. http://dx.doi.org/10.1007/978-3-642-38631-2_53
J. Grosinger, W. Bösch, and J.-M. Schmidt, “Secure Contactless Sphere – Smart RFID-Technologies for a Connected World,” TU Graz Research, vol. 2013-1, no. 9, pp. 13-15, 2013.
Raphael Spreitzer, Thomas Plos: On the Applicability of Time-Driven Cache Attacks on Mobile Devices (Extended Version). Cryptology ePrint Archive, Report 2013/172, 2013.
C. Saminger, M. Stark, M. Gebhart, S. Grünberger, J. Langer, Introduction of very high bitrates for NFC and RFID, e&i Elektrotechnik und Informationstechnik Vol. 130/Issue 7 (Nov. 2013)
Herwig Zeiner, Werner Haas. NFC in the K-Project Secure Contactless Sphere—smart RFID technologies for a connected world. e & i Elektrotechnik und Informationstechnik, 2013, DOI:10.1007/s00502-013-0155-z. [Web]
Stefan Kölbl, Florian Mendel, Tomislav Nad, Martin Schläffer.
Differential Cryptanalysis of Keccak Variants.
Cryptography and Coding, IMA International Conference on Cryptography and Coding, Oxford, UK, December 17-19, 2013. Proceedings. http://dx.doi.org/10.1007/978-3-642-45239-0_9
Erich Wenger, Thomas Korak, Mario Kirschbaum.
Analyzing Side-Channel Leakage of RFID-Suitable Lightweight ECC Hardware. RFID Security – RFIDSec 2013, 9th Workshop, Graz, Austria, July 9-11, 2013. Proceedings. http://link.springer.com/chapter/10.1007/978-3-642-41332-2_9
Begul Bilgin, Andrey Bogdanov, Miroslav Knezevic, Florian Mendel, Qingju Wang.
FIDES: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware.
Cryptographic Hardware and Embedded Systems – CHES 2013, Santa Barbara, USA, August 20-23, 2013. Proceedings. http://dx.doi.org/10.1007/978-3-642-40349-1_9
Mendel, F.; Rijmen, V.; Schläffer, M.: Collision Attack on 5 Rounds of Grøstl. Published in Fast Software Encryption 2014.
Korak, T.; Hutter, M.: On the Power of Active Relay Attacks using Custom-Made Proxies.Published in IEEE International Conference on RFID 2014.
Freidl, P. F.; Gadringer, M. E.; Bösch, W.: Measurement of MM-Wave Identification (MMID) Downlink Channels. – in: Proceedings of the Microelectronic Systems Symposium 2014. (2014), S. 1 – 5
Freidl, P. F.; Khan, H. N.; Gadringer, M. E.; Bösch, W.: Measurements and Analysis of MM-Wave RFID Channels. – in: Proceedings of the 2014 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom). (2014), S. 88 – 91
Liu, Z.; Wenger, E.; Großschädl, J.: MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks.Published in Applied Cryptography and Network Security 2014.
Spreitzer, R.; Gérard, B.: Towards More Practical Time-Driven Cache Attacks. Published in Information Security Theory and Practice 2014.
Groß, H.; Wenger, E.; Martín, H.; Hutter, M.: PIONEER – a Prototype for the Internet of Things based on an Extendable EPC Gen2 RFID Tag. Published in Workshop on RFID Security 2014.
Peßl, P.; Hutter, M.: Curved Tags – A Low-Resource ECDSA Implementation tailored for RFID. Published in Workshop on RFID Security 2014.
Korak, T.; Plos, T.: EM Leakage of RFID Devices – Comparison of Two Measurement Approaches.Published in Conference on Availability, Reliability and Security 2014.
W. Pachler, J. Grosinger, W. Bösch, G. Holweg, and C. Steffan, “A Miniaturized Dual Band RFID Tag,” in Proc. IEEE RFID-Technology and Applications, September 2014.
P. Freidl, M. Gadringer and W. Bösch, “Design of a mm-wave RFID demonstrator”, 2nd Workshop of the Radio Frequency Engineering Working Group of the Austrian Research Association, October 2014.
A. Jonjic and W. Bösch, „A Security and NFC Enhanced Wireless Sensor Network Node,” 2nd Workshop of the Radio Frequency Engineering Working Group of the Austrian Research Association, October 2014.
L. Zöscher, J. Grosinger, H. Watzinger and W. Bösch, “The Evolution of Passive UHF RFID Frontends,” 2nd Workshop of the Radio Frequency Engineering Working Group of the Austrian Research Association, Linz, October 2014.
H. Zeiner and S. Russeger, NFC – IN THE USE FOR CULTURE 2.0, Conference on Cultural Heritage and New Technologies, Wien, 2014
A. Jonjic, J. Grosinger, W. Bösch, T. Herndl, R. Matischek, and G. Holweg, “A Security and NFC Enhanced Wireless Sensor Network Node,” in Proc. IEEE Sensors, November 2014.
Spreitzer, R.: PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices. Published in Security and Privacy in Smartphones and Mobile Devices 2014.
E. Andreeva, B. Bilgin, A. Bogdanov, A. Luykx, F. Mendel, B. Mennink, N. Mouha, K- Yasuda and Q. Wang, PRIMATEs, CAESAR Submission 2014
W. Haas, H. Zeiner, M. Goller und M. Karner, “Contactless Technologies for the Industry – Examples from the K-Project SeCoS,” 15th International Conference On Knowledge Technologies and Data-Driven Business (Smart Production-Track). 2014
C. Dobraunig, M. Eichlseder, F. Mendel and M. Schläffer, ASCON, CAESAR Submission 2014
L. Zöscher, J. Grosinger, U. Muehlmann, H. Watzinger, and W. Bösch, „RF Voltage Limiters for Passive Differential UHF RFID Front-Ends in a 40nm CMOS Technology,“ accepted at the International Microwave Symposium, May 2015.
A. Jonjic, J. Grosinger, T. Herndl, G. Holweg, and W. Bösch, “A Secure Miniaturized Wireless Sensor Node for a Smart Home Demonstrator,” accepted at the International Microwave Symposium, May 2015.
C. Dobraunig, M. Eichlseder, F. Mendel: “Forgery Attacks on round-reduced ICEPOLE-128”. (SAC 2015)
C. Dobraunig, M. Eichlseder, F. Mendel, and M. Schläffer – “Cryptanalysis of Ascon”. (CT-RSA 2015)
C. Dobraunig, M. Eichlseder, and F. Mendel – “Related-Key Forgeries for Proest-OTR”. (FSE 2015)
M. Mühlberghuber, T. Korak, M. Hutter – “Towards Evaluating DPA Countermeasures for KECCAK on a Real ASIC”. (COSADE 2015)
H. Gross: “Sharing is Caring – On the Protection of Arithmetic Logic Units against Passive Physical Attacks”. (RFIDsec 2015)
D. Gruss, R. Spreitzer, S. Mangard: “Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches”. (USENIX Security 2015)
H. Gross, E. Wenger, C. Dobraunig, C. Ehrenhöfer: “Suit up!
Made-to-Measure Hardware Implementations of ASCON”. (DSD 2015)
D. Gruss, D. Bidner, S. Mangard: “Practical Memory Deduplication Attacks in Sandboxed Javascript”. (ESORICS 2015)
C. Dobraunig, M. Eichlseder, F. Mendel: “Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates”. (ASIACRYPT 2015)
C. Dobraunig, M. Eichlseder, F. Mendel: “Analysis of SHA-512/224 and SHA-512/256”. (ASIACRYPT 2015)
H. Gross, M. Hölbl, D. Slamanig, R. Spreitzer: “Privacy-Aware Authentication in the Internet of Things.” (CANS 2015)
C. Dobraunig, M. Eichlseder, F. Mendel: “Higher-Order Cryptanalysis of LowMC” (ICISC 2015)
O. Blazy, D. Derler, D. Slamanig, R. Spreitzer: “Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability” (CT-RSA 2016)
This website uses cookies. By continuing the use of the website we assume your consent.OK