Person

FH-Prof. DI Dr. Jürgen Fuß

Education

Johannes Kepler Universität Linz, Technische Mathematik, Dipl. Ing. Dr. techn.
Oct 1989 - Jul 2001
2017
J. Fuß, M. Grottenthaler - MailCoin - Datenschutz und Datensicherheit, 2017, pp. 487-491 more
2015
J. Fuß, S. Gradinger, B. Greslehner-Nimmervoll, R. Kolmhofer - Complexity Estimates of a SHA-1 Near-Collision Attack for GPU and FPGA - Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES), 2015, Toulouse, Toulouse, France, 2015, pp. 274-280 more
2014
J. Fuß, W. Kastl, B. Greslehner-Nimmervoll, R. Kolmhofer - More efficient brute forcing in a heterogenous cluster with GPUs and FPGAs - ???, Konstanz, Germany, 2014, pp. 127-136 more
2013
J. Fuß, P. Winter, T. Pulls - ScrambleSuit: A Polymorphic Network Protocol to Circumvent Censorship - Proceedings of the Workshop on Privacy in the Electronic Society, Berlin, Germany, 2013 more
2013
B. Danczul, J. Fuß, S. Gradinger, B. Greslehner-Nimmervoll, W. Kastl, F. Wex - Cuteforce Analyzer: A Distributed Bruteforce Attack on PDF Encryption - 8th International Conference on Availability, Reliability and Security (ARES), Regensburg, Germany, 2013, pp. 720-725 more
2013
P. Winter, T. Pulls, J. Fuss - ScrambleSuit: A Polymorph Network Protocol to Circumvent Censorship - Technical Report, Karlstad University, Sweden, 2013, pp. 12 more
2012
J. Fuß, W. Kastl, R. Kolmhofer, G. Schönberger, F. Wex - Cuteforce Analyzer: Implementing a Heterogeneous Bruteforce Cluster with Specialized Coprocessors - LECTURE NOTES IN COMPUTER SCIENCE, Vol. 7394, No. 1234567890, 2012, pp. 201-203 more
2012
R. Mayrhofer, J. Ecker, I. Ion - UACAP: A Unified Auxiliary Channel Authentication Protocol - IEEE Transactions on Mobile Computing, Vol. 999999, No. 999999, 2012 more
2012
E. Hermann, U. Litschauer, J. Fuß - A Formal Equivalence Classes Based Method for Security Policy Conformance Checking - LECTURE NOTES IN COMPUTER SCIENCE, Vol. 7465, No. 1234567890, 2012, pp. 146-160 more
2011
G. Schönberger, J. Fuß - GPU-assisted AES encryption using GCM - Proceedings of the 12th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security - CMS 2011, Ghent, Belgium, 2011, pp. 178-185 more
2008
G. Madlmayr, J. Ecker, J. Langer, J. Scharinger - Establishing a secure infrastructure for remote management of smartcard chips in an NFC ecosystem - DACH Security 2008, TU Berlin, Germany, 2008, pp. 14 more
2008
E. Aichinger, A. Cannon, J. Ecker, L. Kabza, K. Neuerburg - Some near-rings in which all ideals are intersections of Noetherian quotients - ROCKY MOUNTAIN JOURNAL OF MATHEMATICS, Vol. 38, No. 3, 2008, pp. 713-726 more
2008
G. Madlmayr, J. Ecker, J. Langer, J. Scharinger - Near Field Communication: State of Standardization - Proceedings of the Internet-of-Things 2008, Zürich, Switzerland, 2008, pp. 6 more
2006
E. Aichinger, J. Ecker - Every (k+1)-affine complete nilpotent group of class k is affine complete - INTERNATIONAL JOURNAL OF ALGEBRA AND COMPUTATION, Vol. 16, No. 2, 2006, pp. 259-274 more
2006
A. Gaupmann, C. Schausberger, U. Zehl, J. Ecker - Implementing Zero-Knowledge Authentication in OpenSSH - Sicherheit 2006, Magdeburg, Germany, 2006, pp. 302-305 more
2006
J. Ecker - The 1-affine complete generalised dihedral groups - CANADIAN MATHEMATICAL BULLETIN-BULLETIN CANADIEN DE MATHEMATIQUES, Vol. 49, No. 3, 2006, pp. 347-357 more
2003
J. Ecker - The finite 1-affine complete Frobenius groups - ABHANDLUNGEN AUS DEM MATHEMATISCHEN SEMINAR DER UNIVERSITAT HAMBURG, Vol. 73, No. 9999999, 2003, pp. 229-239 more