Banner Left
Logo
Trusted Computing

The SCoS group researches ways to make PCs, embedded devices, and mobile phone more secure. We are using technologies such as TPMs or TrustZone to answer questions like "How ...

Read more...


Logo
Secure RFID

Our main motivation is to provide state-of-the-art and standardized crypto solutions for passive RFID technology. To achieve this, it is necessary to design dedicated HW crypto module...

Read more...

Institute for Applied Information Processing and Communications

 


Formal Methods Secure Crypto-implementations Secure e-Government Trustworthy Systems
Sep 16
D.A.CH 2014 hosted by IAIK
Die D.A.CH-Security 2014 bringt eine interdisziplinäre Übersicht zum aktuellen Stand ...
Read more »
Jun 20
Austrochip 2014 hosted by IAIK
Austrochip is an annual meeting and platform to present the latest activities in the field of microe...
Read more »
May 26
Discrete Logarithm of a 113-bit Koblitz Curve Solved
Erich Wenger and Paul Wolfger set a new record by solving the discrete logarithm problem of a 113-bi...
Read more »