We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Fault Analysis of the PRINCE Family of Lightweight Ciphers
Kundu A., Aikata A., Karmakar B., Saha D.
Journal of Cryptographic Engineering, Vol. 12(4), 475–494
Time-Memory Trade-Offs for Saber+ on Memory-Constrained RISC-V Platform
Zhang J., Huang J., Liu Z., Sinha Roy S.
IEEE Transactions on Computers, Vol. 71(11), 2996-3007
SFP: Providing System Call Flow Protection against Software and Fault Attacks
Schilling R., Nasahl P., Unterguggenberger M., Mangard S.
HASP 2022 - Hardware and Architectural Support for Security and Privacy, Hardware and Architectural Support for Security and Privacy, 18-26
Robust and Scalable Process Isolation against Spectre in the Cloud
Schwarzl M., Borrello P., Kogler A., Varda K., Schuster T., Schwarz M., Gruß D.
European Symposium on Research in Computer Security (ESORICS), 27th European Symposium on Research in Computer Security
Online shielding for reinforcement learning
Könighofer B., Rudolf J., Palmisano A., Tappler M., Bloem R.
Innovations in Systems and Software Engineering
Throwing Boomerangs into Feistel Structures
Hadipour H., Nageler M., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2022(3), 271-302
Proving SIFA protection of masked redundant circuits
Hadzic V., Primas R., Bloem R.
Innovations in Systems and Software Engineering, Vol. 18(3), 471-481
SYNFI: Pre-Silicon Fault Analysis of an Open-Source Secure Element
Nasahl P., Osorio M., Vogel P., Schaffner M., Trippel T., Rizzo D., Mangard S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022(4), 56–87
Riding the Waves Towards Generic Single-Cycle Masking in Hardware
Nagpal R., Gigerl B., Primas R., Mangard S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022(4), 693–717
YOU SHALL NOT COMPUTE on my Data: Access Policies for Privacy-Preserving Data Marketplaces and an Implementation for a Distributed Market using MPC
More S., Alber L.
Proceedings of the 17th International Conference on Availability, Reliability and Security, ARES 2022, 17th International Conference on Availability, Reliability and Security, (ACM International Conference Proceeding Series)
Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX
Giner L., Kogler A., Canella C., Schwarz M., Gruß D.
USENIX Security, 31st USENIX Security Symposium
Half-Double: Hammering From the Next Row Over
Kogler A., Juffinger J., Qazi S., Kim Y., Lipp M., Boichat N., Shiu E., Nissler M., Gruß D.
Proceedings of the 31st USENIX Security Symposium, 31st USENIX Security Symposium, 3807-3824
Privately Connecting Mobility to Infectious Diseases via Applied Cryptography
Bampoulidis A., Bruni A., Helminger L., Kales D., Rechberger C., Walch R.
Proceedings on Privacy Enhancing Technologies 2022, 22nd Privacy Enhancing Technologies Symposium, 768-788
Offline-verifiable Data from Distributed Ledger-based Registries
More S., Heher J., Walluschek C.
Proceedings - 19th International Conference on Security and Cryptography (SECRYPT 2022), 19th International Conference on Security and Cryptography
Multi-Party Computation in the GDPR
Helminger L., Rechberger C.
Privacy Symposium 2022 - Data Protection Law International Convergence and Compliance with Innovative Technologies (DPLICIT), Springer, Cham, 21–39
Integral Cryptanalysis of WARP based on Monomial Prediction
Hadipour H., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2022(2), 92-112
Information-Combining Differential Fault Attacks on DEFAULT
Nageler M., Dobraunig C., Eichlseder M.
EUROCRYPT 2022, 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 168-191, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13277 LNCS)
Multidimensional study on users’ evaluation of the KRAKEN personal data sharing platform
Gabrielli S., Rizzi S., Mayora O., More S., Perez Baun J., Vandevelde W.
Applied Sciences, Vol. 12(7)
Studierfenster
Egger J., Wild D., Weber M., Bedoya C., Karner F., Prutsch A., Schmied M., Dionysio C., Krobath D., Jin Y., Gsaxner C., Li J., Pepe A.
Journal of Digital Imaging, Vol. 35(2), 340-355
Bounds for the Security of Ascon against Differential and Linear Cryptanalysis
Erlacher J., Mendel F., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2022(1), 64-87