Banner Left
Logo
Krypto

The IAIK Krypto group focuses on the security analysis of symmetric primitives. Currently, two co-authors of Grøstl (one of the five SHA-3 finalists) are working in our Krypto group. We conduct basi...

Read more...


Logo
VLSI Design

We focus on secure application specific hardware implementations of cryptographic algorithms. The requirements for our developments are deduced from real word applications to find the...

Read more...

Institute for Applied Information Processing and Communications

 


Formal Methods Secure Crypto-implementations Secure e-Government Trustworthy Systems
Sep 16
D.A.CH 2014 hosted by IAIK
Die D.A.CH-Security 2014 bringt eine interdisziplinäre Übersicht zum aktuellen Stand ...
Read more »
Jun 20
Austrochip 2014 hosted by IAIK
Austrochip is an annual meeting and platform to present the latest activities in the field of microe...
Read more »
May 26
Discrete Logarithm of a 113-bit Koblitz Curve Solved
Erich Wenger and Paul Wolfger set a new record by solving the discrete logarithm problem of a 113-bi...
Read more »