Rasta: A cipher with low ANDdepth and few ANDs per bit
Recent developments in multi party computation (MPC) and fully homomorphic encryption (FHE) promoted the design and analysis of symmetric cryptographic schemes that minimize multiplications in one way or another. In this paper, we propose with Rasta a design strategy...
DetailsProviding secure mechanisms to protect personal data in a mobility platform
Security and privacy preserving methods need to be developed to facilitate cloud usage even for organisations dealing with sensitive information and maintaining security critical services. A reasonable way to achieve the required security properties for outsourced data storage and...
DetailsDeveloping the IT security solutions of tomorrow
At Infosecurity Europe 2018, AIT is showcasing its portfolio of cryptographic solutions for the cloud. Developed over recent years together with industry partners like Atos, IBM, Interoute and Etra, these solutions are driven by the increased need for security...
DetailsD8.2 Smart City use case validation
Contributing Partners ETRA, MPL Executive Summary PRISMACLOUD demonstrators make use of the RTD results in order to test, assess and validate the whole project outcomes. The software components developed to build the PRISMACLOUD cloud services are now integrated to...
DetailsD8.3 E-Government use case validation
Contributing Partners LISPA, UNEW Executive Summary PRISMACLOUD demonstrators make use of the RTD results in order to test, assess and validate the whole project outcomes. The software components developed to build the PRISMACLOUD cloud services are now integrated to...
DetailsISO SC27 meeting in Wuhan, China
In the week from 16 to 20 April 2018, PRISMACLOUD attended the 26th meeting of the ISO SC27 "IT-Security Techniques" in Wuhan, China. We are having two active liaisons with SC27 working groups WG2 "Cryptography and Security Mechanisms" and...
DetailsEngineering Cryptography for Security and Privacy in the Cloud
We published an article in ERCIM News Magazine No. 113 April 2018, titled "Engineering Cryptography for Security and Privacy in the Cloud". The article can be found in ERCIM News No. 113 online edition
DetailsBest Paper Award Nomination
In this year’s DATE (ACM/IEEE/EDAA Design Automation and Test in Europe) conference the submission “A Fast and Resource Efficient FPGA Implementation of Secret Sharing for Storage Applications” by Jakob Stangl, Thomas Lorünser, and Sai Manoj Pudukotai Dinakarrao has made...
DetailsA Fast and Resource Efficient FPGA Implementation of Secret Sharing for Storage Applications
Title A Fast and Resource Efficient FPGA Implementation of Secret Sharing for Storage Applications Authors Jakob Stangl (TU Wien) , Thomas Lorünser (AIT Austrian Institute of Technology), Sai Dinakarrao (TU Wien) Abstract Outsourcing data into the cloud gives wide benefits...
DetailsHighly-Efficient Fully-Anonymous Dynamic Group Signatures
Group signatures are a central tool in privacy-enhancing cryptography, which allow members of a group to anonymously produce signatures on behalf of the group. Consequently, they are an attractive means to implement privacy-friendly authentication mechanisms. Ideally, group signatures are...
Details