We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Time-Memory Trade-Offs for Saber+ on Memory-Constrained RISC-V Platform
Zhang J., Huang J., Liu Z., Sinha Roy S.
IEEE Transactions on Computers, Vol. 71(11), 2022
SFP: Providing System Call Flow Protection against Software and Fault Attacks
Schilling R., Nasahl P., Unterguggenberger M., Mangard S.
HASP 2022 - Hardware and Architectural Support for Security and Privacy
Robust and Scalable Process Isolation against Spectre in the Cloud
Schwarzl M., Borrello P., Kogler A., Varda K., Schuster T., Schwarz M., Gruß D.
European Symposium on Research in Computer Security (ESORICS)
Online shielding for reinforcement learning
Könighofer B., Rudolf J., Palmisano A., Tappler M., Bloem R.
Innovations in Systems and Software Engineering, 2022
Throwing Boomerangs into Feistel Structures
Hadipour H., Nageler M., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2022(3), 2022
Proving SIFA protection of masked redundant circuits
Hadzic V., Primas R., Bloem R.
Innovations in Systems and Software Engineering, Vol. 18(3), 2022
SYNFI: Pre-Silicon Fault Analysis of an Open-Source Secure Element
Nasahl P., Osorio M., Vogel P., Schaffner M., Trippel T., Rizzo D., Mangard S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022(4), 2022
Riding the Waves Towards Generic Single-Cycle Masking in Hardware
Nagpal R., Gigerl B., Primas R., Mangard S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022(4), 2022
YOU SHALL NOT COMPUTE on my Data: Access Policies for Privacy-Preserving Data Marketplaces and an Implementation for a Distributed Market using MPC
More S., Alber L.
Proceedings of the 17th International Conference on Availability, Reliability and Security, ARES 2022
Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX
Giner L., Kogler A., Canella C., Schwarz M., Gruß D.
USENIX Security
Half-Double: Hammering From the Next Row Over
Kogler A., Juffinger J., Qazi S., Kim Y., Lipp M., Boichat N., Shiu E., Nissler M., Gruß D.
Proceedings of the 31st USENIX Security Symposium
Privately Connecting Mobility to Infectious Diseases via Applied Cryptography
Bampoulidis A., Bruni A., Helminger L., Kales D., Rechberger C., Walch R.
Proceedings on Privacy Enhancing Technologies 2022
Offline-verifiable Data from Distributed Ledger-based Registries
More S., Heher J., Walluschek C.
Proceedings - 19th International Conference on Security and Cryptography (SECRYPT 2022)
Multi-Party Computation in the GDPR
Helminger L., Rechberger C.
Privacy Symposium 2022 - Data Protection Law International Convergence and Compliance with Innovative Technologies (DPLICIT)
Integral Cryptanalysis of WARP based on Monomial Prediction
Hadipour H., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2022(2), 2022
Information-Combining Differential Fault Attacks on DEFAULT
Nageler M., Dobraunig C., Eichlseder M.
EUROCRYPT 2022
Multidimensional study on users’ evaluation of the KRAKEN personal data sharing platform
Gabrielli S., Rizzi S., Mayora O., More S., Perez Baun J., Vandevelde W.
Applied Sciences, Vol. 12(7), 2022
Studierfenster
Egger J., Wild D., Weber M., Bedoya C., Karner F., Prutsch A., Schmied M., Dionysio C., Krobath D., Jin Y., Gsaxner C., Li J., Pepe A.
Journal of Digital Imaging, Vol. 35(2), 2022
Bounds for the Security of Ascon against Differential and Linear Cryptanalysis
Erlacher J., Mendel F., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2022(1), 2022
Practical Key Recovery Attacks on FlexAEAD
Dunkelman O., Eichlseder M., Kales D., Keller N., Leurent G., Schofnegger M.
Designs, Codes and Cryptography, 2022
