We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Kavach: Lightweight masking techniques for polynomial arithmetic in lattice-based cryptography
Aikata A., Basso A., Cassiers G., Mert A., Sinha Roy S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2023(3), 2023
SCRAMBLE-CFI: Mitigating Fault-Induced Control-Flow Attacks on OpenTitan
Nasahl P., Mangard S.
GLSVLSI 2023 - Proceedings of the Great Lakes Symposium on VLSI 2023
A Unified Cryptoprocessor for Lattice-based Signature and Key-exchange
Aikata A., Mert A., Jacquemin D., Das A., Matthews D., Ghosh S., Sinha Roy S.
IEEE Transactions on Computers, Vol. 72(6), 2023
Formal Verification of Arithmetic Masking in Hardware and Software
Gigerl B., Primas R., Mangard S.
Applied Cryptography and Network Security
HashTag: Hash-based Integrity Protection for Tagged Architectures
Lamster L., Unterguggenberger M., Schrammel D., Mangard S.
Proceedings of the 32nd USENIX Security Symposium
Machine Learning Based Risk Prediction for Major Adverse Cardiovascular Events for ELGA-Authorized Clinics
Polat Erdeniz S., Kramer D., Schrempf M., Rainer P., Felfernig A., Tran T., Burgstaller T., Lubos S.
Studies in Health Technology and Informatics, Vol. 301, 2023
CustomProcessingUnit: Reverse Engineering and Customization of Intel Microcode
Borrello P., Easdon C., Schwarzl M., Czerny R., Schwarz M.
IEEE Workshop on Offensive Technologies (WOOT 23)
Provable Correct and Adaptive Simplex Architecture for Bounded-Liveness Properties
Maderbacher B., Schupp S., Bartocci E., Bloem R., Nickovic D., Könighofer B.
Model Checking Software - 29th International Symposium, SPIN 2023, Proceedings
High-speed Design of Post Quantum Cryptography with Optimized Hashing and Multiplication
Imran M., Aikata A., Sinha Roy S., Pagliarini S.
IEEE Transactions on Circuits and Systems, Part II: Express Briefs , 2023
Digital Communication Tools in Private and Professional Environments
Keller S., Pirker J., List E.
Learning in the Age of Digital and Green Transition
Finding Collisions for Round-Reduced Romulus-H
Nageler M., Pallua F., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2023(1), 2023
A Systematic Approach to Automotive Security
Ebrahimi M., Marksteiner S., Nickovic D., Bloem R., Schögler D., Eisner P., Sprung S., Schober T., Chlup S., Schmittner C., König S.
Formal Methods - 25th International Symposium, FM 2023, Proceedings
Extending Expressive Access Policies with Privacy Features
More S., Ramacher S., Alber L., Herzl M.
The 21th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2022)
Preventing a Cryptoapocalypse
Sinha Roy S., Banerjee U.
IEEE Solid-State Circuits Magazine, Vol. 15, 2023
A Security-Evaluation Framework for Mobile Cross-Border e-Government Solutions
Zefferer T., Prünster B., Kollmann C., Corici A., Alber L., Czerny R., Podgorelec B.
DGO '23: Proceedings of the 24th Annual International Conference on Digital Government Research
Towards a Mobile-First Cross-Border eID Framework
Czerny R., Kollmann C., Podgorelec B., Prünster B., Zefferer T.
Proceedings of the 24th Annual International Conference on Digital Government Research - Together in the Unstable World
The IJCAI-23 Joint Workshop on Artificial Intelligence Safety and Safe Reinforcement Learning (AISafety-SafeRL2023)
Pedroza G., Chen X., Hernández-Orallo J., Huang X., Theodorou A., Matragkas N., Espinoza H., Mallah R., McDermid J., Castillo-Effen M., Bossens D., Könighofer B., Tschiatschek S., Liu A.
CEUR Workshop Proceedings, Vol. 3505, 2023
SCFI: State Machine Control-Flow Hardening Against Fault Attacks
Nasahl P., Unterguggenberger M., Nagpal R., Schilling R., Schrammel D., Mangard S.
2023 Design, Automation and Test in Europe Conference and Exhibition, DATE 2023 - Proceedings
EC-CFI: Control-Flow Integrity via Code Encryption Counteracting Fault Attacks
Nasahl P., Sultana S., Liljestrand H., Grewal K., LeMay M., Durham D., Schrammel D., Mangard S.
Proceedings of the 2023 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2023
MEMES: Memory Encryption-based Memory Safety on Commodity Hardware
Schrammel D., Sultana S., Grewal K., LeMay M., Durham D., Unterguggenberger M., Nasahl P., Mangard S.
SECRYPT 2023 - Proceedings of the 20th International Conference on Security and Cryptography
