FH-Prof. DI Dr. Jürgen Fuß


Johannes Kepler Universität Linz, Technische Mathematik, Dipl. Ing. Dr. techn.
Okt. 1989 - Juli 2001
T. Grurl, J. Fuß, L. Burgholzer, S. Hillmich, R. Wille - Arrays vs. Decision Diagrams: A Case Study on Quantum Circuit Simulators - 2020 IEEE 50th International Symposium on Multiple-Valued Logic (ISMVL), Miyazaki, Japan, 2020, pp. 176-181 mehr
J. Fuß, M. Grottenthaler - MailCoin - Datenschutz und Datensicherheit, 2017, pp. 487-491 mehr
J. Fuß, S. Gradinger, B. Greslehner-Nimmervoll, R. Kolmhofer - Complexity Estimates of a SHA-1 Near-Collision Attack for GPU and FPGA - Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES), 2015, Toulouse, Toulouse, Frankreich, 2015, pp. 274-280 mehr
J. Fuß, W. Kastl, B. Greslehner-Nimmervoll, R. Kolmhofer - Effizienteres Bruteforcing auf einem heterogenen Cluster mit GPUs und FPGAs - Sicherheit 2014, Konstanz, Deutschland, 2014, pp. 127-136 mehr
J. Fuß, P. Winter, T. Pulls - ScrambleSuit: A Polymorphic Network Protocol to Circumvent Censorship - Proceedings of the Workshop on Privacy in the Electronic Society, Berlin, Deutschland, 2013 mehr
B. Danczul, J. Fuß, S. Gradinger, B. Greslehner-Nimmervoll, W. Kastl, F. Wex - Cuteforce Analyzer: A Distributed Bruteforce Attack on PDF Encryption - 8th International Conference on Availability, Reliability and Security (ARES), Regensburg, Deutschland, 2013, pp. 720-725 mehr
P. Winter, T. Pulls, J. Fuss - ScrambleSuit: A Polymorph Network Protocol to Circumvent Censorship - Technical Report, Karlstad University, Schweden, 2013, pp. 12 mehr
R. Mayrhofer, J. Ecker, I. Ion - UACAP: A Unified Auxiliary Channel Authentication Protocol - IEEE Transactions on Mobile Computing, Vol. 999999, No. 999999, 2012 mehr
J. Fuß, W. Kastl, R. Kolmhofer, G. Schönberger, F. Wex - Cuteforce Analyzer: Implementing a Heterogeneous Bruteforce Cluster with Specialized Coprocessors - LECTURE NOTES IN COMPUTER SCIENCE, Vol. 7394, No. 1234567890, 2012, pp. 201-203 mehr
E. Hermann, U. Litschauer, J. Fuß - A Formal Equivalence Classes Based Method for Security Policy Conformance Checking - LECTURE NOTES IN COMPUTER SCIENCE, Vol. 7465, No. 1234567890, 2012, pp. 146-160 mehr
G. Schönberger, J. Fuß - GPU-assisted AES encryption using GCM - Proceedings of the 12th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security - CMS 2011, Ghent, Belgien, 2011, pp. 178-185 mehr
G. Madlmayr, J. Ecker, J. Langer, J. Scharinger - Sichere Infrastruktur zur Fernverwaltung von Smartcard-Chips in einem NFC-Ökosystem - DACH Security 2008, TU Berlin, Deutschland, 2008, pp. 14 mehr
E. Aichinger, A. Cannon, J. Ecker, L. Kabza, K. Neuerburg - Some near-rings in which all ideals are intersections of Noetherian quotients - ROCKY MOUNTAIN JOURNAL OF MATHEMATICS, Vol. 38, No. 3, 2008, pp. 713-726 mehr
G. Madlmayr, J. Ecker, J. Langer, J. Scharinger - Near Field Communication: State of Standardization - Proceedings of the Internet-of-Things 2008, Zürich, Schweiz, 2008, pp. 6 mehr
E. Aichinger, J. Ecker - Every (k+1)-affine complete nilpotent group of class k is affine complete - INTERNATIONAL JOURNAL OF ALGEBRA AND COMPUTATION, Vol. 16, No. 2, 2006, pp. 259-274 mehr
A. Gaupmann, C. Schausberger, U. Zehl, J. Ecker - Implementing Zero-Knowledge Authentication in OpenSSH - Sicherheit 2006, Magdeburg, Deutschland, 2006, pp. 302-305 mehr
J. Ecker - The 1-affine complete generalised dihedral groups - CANADIAN MATHEMATICAL BULLETIN-BULLETIN CANADIEN DE MATHEMATIQUES, Vol. 49, No. 3, 2006, pp. 347-357 mehr
J. Ecker - The finite 1-affine complete Frobenius groups - ABHANDLUNGEN AUS DEM MATHEMATISCHEN SEMINAR DER UNIVERSITAT HAMBURG, Vol. 73, No. 9999999, 2003, pp. 229-239 mehr