17.01.2014 Views

Download IAIK Info Brochure - Institute of Applied Information ...

Download IAIK Info Brochure - Institute of Applied Information ...

Download IAIK Info Brochure - Institute of Applied Information ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The goal <strong>of</strong> the FIT-IT-funded project QCC is to realize an<br />

FPGA-based system on chip for securing virtual private<br />

networks by combining quantum cryptography with classical<br />

cryptography.<br />

The Open Trusted Computing (OpenTC) consortium is a<br />

research & development project focusing on the development<br />

<strong>of</strong> trusted and secure computing systems based on open<br />

source s<strong>of</strong>tware. The project targets traditional computer<br />

platforms as well as embedded systems such as mobile<br />

phones. The goal <strong>of</strong> OpenTC is to protect against systemrelated<br />

threats, errors, and malfunctions.<br />

TOPAS<br />

TOPAS (Trust Oriented Platform For Advanced Security)<br />

works on providing the necessary framework for creating<br />

trusted – or trustworthy – personal devices, devices that are as<br />

familiar to their users as their mobile phones are and that can<br />

be used in security-relevant or sensitive application scenarios.<br />

The major objective <strong>of</strong> this project is the development <strong>of</strong> a<br />

framework <strong>of</strong> Mobile Trusted Platforms that can be used on<br />

a variety <strong>of</strong> mobile and embedded systems, cost-effectively<br />

providing trusted computing technologies to these platforms,<br />

irrespective <strong>of</strong> the security features <strong>of</strong> the underlying system.<br />

ISCA<br />

Investigation <strong>of</strong> Side Channel Attacks (ISCA) is an FWF<br />

project dealing with the development <strong>of</strong> new side-channel<br />

analysis attacks and countermeasures for symmetric and<br />

asymmetric cryptographic primitives.<br />

12

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!