IAIK
   HOME

TheInfoList



OR:

The Institute for Applied Information Processing and Communications (IAIK) is part of the Faculty of Computer Science and Biomedical Engineering at the
Graz University of Technology Graz University of Technology (german: link=no, Technische Universität Graz, short ''TU Graz'') is one of five universities in Styria, Austria. It was founded in 1811 by Archduke John of Austria and is the oldest science and technology research ...
(TU Graz). IAIK is concerned with aspects of
computer security Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, the ...
and
information security Information security, sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorize ...
. Current focal points are set on design of new
cryptographic algorithms Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or '' -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adve ...
, implementation of cryptographic algorithms and protocols in hardware as well as in software,
network security Network security consists of the policies, policies, processes and practices adopted to prevent, detect and monitor unauthorized access, Abuse, misuse, modification, or denial of a computer network and network-accessible resources. Network securi ...
,
e-Government E-government (short for electronic government) is the use of technological communications devices, such as computers and the Internet, to provide public services to citizens and other persons in a country or region. E-government offers new ...
, and
trusted computing Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning that is distinct from the field of Confidential Computing. The core ide ...
. IAIK conducts applied research into these areas, fostering a holistic view of the aspects of computer and information security. Teaching activities closely follow the latest developments in IAIK’s research fields. The activities of IAIK are led by Stefan Mangard after Reinhard Posch abdicated in 2019.IAIK Homepage
"New head of IAIK"
Retrieved on 26 December 2019
IAIK is specialized on following specific aspects of computer and information security: *
VLSI Very large-scale integration (VLSI) is the process of creating an integrated circuit (IC) by combining millions or billions of MOS transistors onto a single chip. VLSI began in the 1970s when MOS integrated circuit (Metal Oxide Semiconductor) c ...
design and security * Implementation attacks * RFID hardware and security * Software security * E-Government * Trusted computing * Design and analysis of hash and block cipher primitives * Network security * Formal methods in verification and design


References


External links


IAIK


{{DEFAULTSORT:Institute For Applied Information Processing And Communications Research institutes in Austria Graz University of Technology