We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Cache Timing Leakages in Zero-Knowledge Protocols
Mukherjee S., Rechberger C., Schofnegger M.
7th Conference on Advances in Financial Technologies
Poseidon and Neptune
Grassi L., Koschatko K., Rechberger C.
IACR Transactions on Symmetric Cryptology, Vol. 2025(2), 2025
LEAP: A Fast, Lattice-based OPRF with Application to Private Set Intersection
Heimberger L., Kales D., Lolato R., Mir O., Ramacher S., Rechberger C.
Advances in Cryptology – EUROCRYPT 2025 - 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
Skyscraper: Fast Hashing on Big Primes
Schmid F., Rechberger C., Koschatko K., Grassi L., Bouvier C., Khovratovich D., Schofnegger M.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2025(2), 2025
Minimize the Randomness in Rasta-Like Designs: How Far Can We Go?
Schmid F., Rechberger C., Grassi L., Liu F., Walch R., Wang Q.
Selected Areas in Cryptography – SAC 2024 - 31st International Conference, 2024, Revised Selected Papers
SoK: Computational and Distributed Differential Privacy for MPC
Meisingseth F., Rechberger C.
Proceedings on Privacy Enhancing Technologies
Practical Two-party Computational Differential Privacy with Active Security
Meisingseth F., Rechberger C., Schmid F.
Proceedings on Privacy Enhancing Technologies
One Tree to Rule Them All
Baum C., Beullens W., Mukherjee S., Orsini E., Ramacher S., Rechberger C., Roy L., Scholl P.
Advances in Cryptology – ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
b4M: Holistic Benchmarking for MPC
Koch K., Rechberger C., Rotaru D.
Availability, Reliability and Security. ARES 2025
Exploring the Six Worlds of Gröbner Basis Cryptanalysis: Application to Anemoi
Koschatko K., Lüftenegger R., Rechberger C.
IACR Transactions on Symmetric Cryptology, Vol. 2024(4), 2024
Monolith
Grassi L., Khovratovich D., Lüftenegger R., Rechberger C., Schofnegger M., Walch R.
IACR Transactions on Symmetric Cryptology, Vol. 2024(3), 2024
OPRFs from Isogenies
Heimberger L., Hennerbichler T., Meisingseth F., Ramacher S., Rechberger C.
ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security
Towards Private Deep Learning-Based Side-Channel Analysis using Homomorphic Encryption
Schmid F., Rechberger C., Mukherjee S., Stöttinger M., Picek S., De Santis F.
Constructive Side-Channel Analysis and Secure Design
Towards Private Deep Learning-Based Side-Channel Analysis Using Homomorphic Encryption
Schmid F., Mukherjee S., Picek S., Stöttinger M., De Santis F., Rechberger C.
Constructive Side-Channel Analysis and Secure Design - 15th International Workshop, COSADE 2024, Proceedings
Hiding Your Awful Online Choices Made More Efficient and Secure
Mukherjee S., Walch R., Meisingseth F., Lex E., Rechberger C.
ICT Systems Security and Privacy Protection - 39th IFIP International Conference, SEC 2024, Proceedings
Pasta: A Case for Hybrid Homomorphic Encryption
Dobraunig C., Grassi L., Helminger L., Rechberger C., Schofnegger M., Walch R.
TCHES 2023 Volume 2023/3
Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications
Grassi L., Hao Y., Rechberger C., Schofnegger M., Walch R., Wang Q.
Crypto 2023
Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto
Dobraunig C., Kales D., Rechberger C., Schofnegger M., Zaverucha G.
CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
Reinforced Concrete: A Fast Hash Function for Verifiable Computation
Lüftenegger R., Rechberger C., Grassi L., Schofnegger M., Walch R., Khovratovich D.
CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
Privately Connecting Mobility to Infectious Diseases via Applied Cryptography
Bampoulidis A., Bruni A., Helminger L., Kales D., Rechberger C., Walch R.
Proceedings on Privacy Enhancing Technologies 2022
