Banner Left
Logo
Systematic Construction of Correct Systems

The Systematic Construction of Correct Systems group, led by Prof. Roderick Bloem, focuses on the design, implementation, and verification of secure and correct systems....

Read more...


Logo
Java Security

The Java Security group focuses on secure, performance-optimized software implementations of cryptographic algorithms and protocols. The research area covers several aspects of dat...

Read more...

Institute of Applied Information Processing and Communications

 


Formal Methods Secure Crypto-implementations Secure e-Government Trustworthy Systems
May 14
CPU transient execution hits again: several critical vulnerabilities discovered in Intel CPUs
A group of researchers at IAIK discovered new critical vulnerabilities in Intel CPUs which, simi...
Read more »
Feb 21
Ascon won the CAESAR competition for lightweight authenticated ciphers
We are very happy to announce that Ascon has been selected as the primary recommendation for lightwe...
Read more »
Feb 11
SGS and Graz University of Technology set up Cybersecurity Campus Graz
A unique IT security research, education, testing and certification hub is taking shape in Styria, A...
Read more »