Technical publications
Year 2012

 

  • TBA   “EM probes characterisation for security analysis” by B. Mounier, A-L. Ribotta, J. Fournier, M. Agoyan & A. Tria, in ‘Cryptography and Security: From Theory to Applications’, Quisquater Festschrift, pp 248-264, D. Naccache editor, Springer LNCS 6805, March 2012

  • TBA   Martin Pirker, Johannes Winter, Ronald Toegl, Lightweight distrubuted attestation for the cloud. 2nd international conference on cloud computing and services science, Porto, Portugal, 18-21 April, 2012

  • TBA   A.P.Fournaris and O. Koufopavlou “Distributed Threshold Certificate Based Encryption Scheme with no Trusted Dealer”, IFIP International Information Security and Privacy Conference 2012

  • TBA   A.P.Fournaris, “Protecting CRT RSA against Fault and Power Side Channel Attack”, Fifth IFIP International Conference on New Technologies, Mobility and Security

  • TBA   A.P.Fournaris, “Toward Flexible Security and Trust Hardware Structures for Mobile-Portable Systems”, IEEE Transactions on Latin America Journal

  • TBA   A.P. Fournaris,” Parallel GF(2k) Montgomery Multiplication for Arbitrary Irreducible Polynomials”, IEEE Transactions on Parallel and Distributed Computing  Journal
Year 2011
  • “A Side-Channel and Fault Attack Resistant AES circuit working on duplicated complemented values” by Marion Doulcier-Verdier, Jean-Max Dutertre, Jacques Fournier, Jean-Baptiste Rigaud, Bruno Robisson & Assia Tria, in Solid State Circuits Conference — Digest of technical papers, 2011 (ISSCC 2011), page 15.6,  IEEE International, February 2011.

  • Z. Balogh, E. Gatial, L. Hluchý, V. Hudek and M. Konečný: "Integration of Secure Agents with a Secure Communication Infrastructure for Crisis Management", The 2011 International Conference on Collaboration Technologies and Systems (CTS 2011) - workshop ERDM - International Workshop on Collaborations in Emergency Response and Disaster Management

  • “Design of a duplicated fault-detecting AES chip and yet using clock set-up time violations to extract 13 out of 16 bytes of the secret key.” Poster Session, Smart Systems Integration (SSI 2011) conference in Dresden, Germany;

  • A.P. Fournaris, "DISTRIBUTED THRESHOLD CRYPTOGRAPHY CERTIFICATION WITH NO TRUSTED DEALER", International Conference on Security and Cryptography (SECRYPT 2011)

  • Stefan Kraxberger, Christoph Gratl, Udo Payer, “Performance Evaluation of IPv6 Label Switched Paths for Wireless Sensor Networks”. 7th International wireless Communications and Mobile Computing conference (IWCMC-2011)

  • A.P. Fournaris and O. Koufopavlou, "Efficient CRT RSA with SCA countermeasures", 14th Euromicro Conference on Digital System Design (DSD 2011), session on ‘Architectures & Hardware for Security Applications’

  • Stefan Kraxberger - "Scalable Secure Routing for Heterogeneous Unstructured P2P Networks", 19th Euromicro International Conference on Parallel, Distributed and Network-Based Computing

  • Apostolos P. Fournaris, Daniel M. Hein, Nicolas Sklavos and Paris Kitsos, "Trust Ensurance Through Hardware Means: Design Concerns, Optimizations and Future Trends"

  • “Design & characterisation of an AES chip embedding countermeasures” by M. Agoyan, S. Bouquet, J-M. Dutertre, J. Fournier, J-B. Rigaud, B. Robisson & A. Tria, in the International Journal of Intelligent Engineering Informatics (IJIEI) – Special Issue on ‘Communication and Security Systems’, vol. 1, n° 3/4, pp 328-347, November 2011.

Year 2010

  • M.Doulcier-Verdier, J. Fournier, C. Roscian & A. Tria: Comparing Architectural Approaches for a Multi-Size AES Key Scheduler

  • Peter Danner, Daniel Hein, Stefan Kraxberger, Securing Emergency Response Operations Using Distributed Trust Decisions, Proceedings of the 2010 Fourth International Conference on Network and System Security (NSS2010), Melbourne, Australia, September 1-3, 2010

  • Stefan Kraxberger, Daniel Hein, Peter Danner, Secure Multi-Agent System for Multi-Hop Environments, Proceedings of the 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2010), St. Petersburg, Russia, September 8-10, 2010

  • Apostolos P. Fournaris, “Fault and Simple Power Attack Resistant RSA using Montgomery Modular Multiplication”, in proc of 2010 IEEE International Symposium on Circuits and Systems (ISCAS 10), Paris, France, 29th May -2 July 2010. PAPER

  • Apostolos P. Fournaris,” Hardware Module Design for Ensuring Trust” in proc of IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2010), Kefalonia, Greece, 5-7 July 2010. (not online yet)

  • Daniel Hein, Ronald Toegl, Stefan Kraxberger - "An Autonomous Attestation Token to Secure Mobile Agents in Disaster Response" - Security and communication networks, 10.1002/sec.196. PAPER

  • Gatial Emil, Balogh Zoltan, Hluchy Ladislav: Platform for distributed execution of agents for trusted data collection, *International Conference on Computational Science 2010* (ICCS 2010). PAPER

  • Hluchý Ladislav, Balogh Zoltán, Gatial Emil: Distributed Agent-based Architecture for Management of Crisis Situations using Trusted Code Execution, Journal Acta Electrotechnica et informatica. PAPER

  • Stefan Kraxberger, Guenther Lackner, Udo Payer - "WLAN Location Determination without Active Client Collaboration" - 6th ACM International Wireless Communications and Mobile Computing Conference (IWCMC 2010), Caen, France, 28.06 - 02.07.2010- Security and communication networks, 10.1002/sec.196.

  • Apostolos P. Fournaris “Trust Ensuring Crisis Management Hardware Module", Information Security Journal: A Global Perspective, Volume 19, Issue 2, Taylor and Francis, 2010. PAPER

  • Invited lecture and a conference paper:
    Hluchy Ladislav, Balogh Zoltán, Gatial Emil: Distributed Agent-based Architecture for Management of Crisis Situations using Trusted Agent Execution, invited paper, In Proc. of SAMI 2010 PAPER

Year 2009

  • ŠIMO, Branislav - BALOGH, Zoltán - HABALA, Ondrej - BUDINSKÁ, Ivana - HLUCHÝ, Ladislav. Architecture of the secure agent infrastructure for management of crisis situations. In Informačné technológie - Aplikácie a teória : zborník príspevkov prezentovaných na pracovnom seminári ITAT. Editor P. Vojtáš. - Praha : Matematicko-fyzikální fakulta UK, 2009. ISBN 978-80-970179-1-0, p. 79-82. PAPER

  • Udo Payer, Stefan Kraxberger, Peter Holzer - "IPv6 Label Switching on IEEE 802.15.4"  SENSORCOMM 2009. IPv6 Label Switching on IEEE 802.15.4” describes the use of IPv6 on sensor networks. In doing so, we use a modified version of 6LoWPAN, capable to support QoS and power aware routing. PAPER on demand

  • Stefan Kraxberger, Udo Payer - "Secure Routing for Unstructured P2P Systems"  -  SECUREWARE 2009: http://www.iaria.org/ conferences2009/ SECURWARE09.html  “Secure Routing for Unstructured P2P Systems” is needed for group-management, group security and message forwarding in unstructured ad-hoc networks. PAPER on demand

  • Stefan Kraxberger, Udo Payer - "Security Concept for Peer-to-Peer Systems" - IWCMC 2009: http://iwcmc.com/ - “Security Concept for Peer-to-Peer Systems” describes the secure group- and routing mechanisms (which are used in SECRICOM) in general. PAPER on demand

  • Daniel M. Hein, Ronald Toegl: An Autonomous Attestation Token to Secure Mobile Agents in Disaster Response, MobiSec 2009

  • Peter Danner, Daniel Hein - "A Trusted Computing Identity Collation Protocol To Simplify Deployment of New Disaster Response Devices", presented by Peter Danner (2009.09.03), 4th European Trusted Infrastructure Summerschool

  • Apostolos P. Fournaris:  Trust Ensuring Crisis Management Hardware Module, Information Security Journal: A global Perspective, Special Issue on Cryptographic Hardware and Embedded system PAPER
 
Silentel

GET IN TOUCH

Perhaps you’d like more details, or just want to say hello.


Silentel