Banner Left
Logo
Java Security

The Java Security group focuses on secure, performance-optimized software implementations of cryptographic algorithms and protocols. The research area covers several aspects of dat...

Read more...


Logo
Systematic Construction of Correct Systems

The Systematic Construction of Correct Systems group, led by Prof. Roderick Bloem, focuses on the design, implementation, and verification of secure and correct systems....

Read more...

Institute of Applied Information Processing and Communications

 


Formal Methods Secure Crypto-implementations Secure e-Government Trustworthy Systems
Feb 21
Ascon won the CAESAR competition for lightweight authenticated ciphers
We are very happy to announce that Ascon has been selected as the primary recommendation for lightwe...
Read more »
Feb 11
SGS and Graz University of Technology set up Cybersecurity Campus Graz
A unique IT security research, education, testing and certification hub is taking shape in Styria, A...
Read more »
Jan 30
Picnic and SPHINCS+ selected for round 2 of NIST PQC project
Picnic and SPHINCS+, two post-quantum secure digital signature schemes designed by teams involving c...
Read more »