University Institute of Information Technology

Results: 1212



#Item
111Records management / Humanities / Computing / Information science / Workflow technology / Museology / Collections care / Data management / Provenance / GraphML / Workflow / Data

Automatic Provenance Collection and Publishing in a Science Data Production Environment—Early Results James Frew, Greg Janée, and Peter Slaughter Institute for Computational Earth System Science, University of Califor

Add to Reading List

Source URL: legacy.alexandria.ucsb.edu

Language: English - Date: 2011-07-09 00:19:12
112Public-key cryptography / Homeomorphisms / Homomorphic encryption / Cryptography / Institute for Applied Information Processing and Communications / FHE

Cryptography for the Cloud Advisor(s): Christian Rechberger, David Derler Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
113Instruction set architectures / Reduced instruction set computing / RISC-V / Instruction set / ARM architecture / Comparison of instruction set architectures

Secure AES Implementation on a 32-bit RISC-V Processor Advisor(s): Hannes Groß Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2016-02-24 05:00:01
114University of Science and Technology / Institute of Technology / Book:Worlds best Universities

SHOT Albuquerque Meeting 8–11 October 2015 Preliminary Program (The scheduling information in this preliminary program is current as of 8 July 2015, but it is subject to change at any time. For the most up-to-date info

Add to Reading List

Source URL: historyoftechnology.org

Language: English - Date: 2015-07-14 16:32:42
115Public-key cryptography / Coding theory / Finite fields / Information theory / Linear network coding / Wireless sensor network / RSA / Digital signature / Homomorphism / Homomorphic encryption

Homomorphic Signatures for Verifiable Computing Advisor(s): Christian Hanser Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
116Delft University of Technology / Kavli Institute of Nanoscience

Pumping of vibrational excitations in a Coulomb blockaded suspended carbon nanotube Supplementary Information A. K. H¨ uttel,1 B. Witkamp,1 M. Leijnse,2, 3, 4 M. R. Wegewijs,2, 3, 4 and H. S. J. van der Zant1 1

Add to Reading List

Source URL: www.akhuettel.de

Language: English
117Signature / Records management technology / Biometrics / Key management / Digital signature / Public-key cryptography / Cryptography

Privacy Preserving Healthcare Advisor(s): Daniel Slamanig, David Derler Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
118NIST hash function competition / Cryptographic hash functions / SHA-3 / Hashing / Cryptography / Application-specific integrated circuit / Institute for Applied Information Processing and Communications / Crypt / Zorro

Side-Channel Analysis of the Zorro ASIC Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
119Applied mathematics / Cryptography / Block ciphers / Data Encryption Standard / Cryptanalysis / Linear cryptanalysis / Differential cryptanalysis / S-box / Advanced Encryption Standard / PRESENT / LOKI

Automatic Tool for Cryptanalysis Advisor(s): Christoph Dobraunig and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
120Advanced Encryption Standard / Flush / Side-channel attack / Tiny Encryption Algorithm

Trace Driven Cache Attacks against AES Advisor(s): Daniel Gruss Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
UPDATE