Banner Left
Logo
Trusted Computing

The SCoS group researches ways to make PCs, embedded devices, and mobile phone more secure. We are using technologies such as TPMs or TrustZone to answer questions like "How ...

Read more...


Logo
Java Security

The Java Security group focuses on secure, performance-optimized software implementations of cryptographic algorithms and protocols. The research area covers several aspects of dat...

Read more...

Institute for Applied Information Processing and Communications

 


Formal Methods Secure Crypto-implementations Secure e-Government Trustworthy Systems
Sep 16
D.A.CH 2014 hosted by IAIK
Die D.A.CH-Security 2014 bringt eine interdisziplinäre Übersicht zum aktuellen Stand ...
Read more »
Jun 20
Austrochip 2014 hosted by IAIK
Austrochip is an annual meeting and platform to present the latest activities in the field of microe...
Read more »
May 26
Discrete Logarithm of a 113-bit Koblitz Curve Solved
Erich Wenger and Paul Wolfger set a new record by solving the discrete logarithm problem of a 113-bi...
Read more »