We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs
Gigerl B., Hadzic V., Primas R., Mangard S., Bloem R.
Proceedings of the 30th USENIX Security Symposium
Protecting Indirect Branches against Fault Attacks using ARM Pointer Authentication
Nasahl P., Schilling R., Mangard S.
Proceedings of the 2021 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2021
SecWalk: Protecting Page Table Walks Against Fault Attacks
Schilling R., Nasahl P., Weiglhofer S., Mangard S.
Proceedings of the 2021 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2021
Secure and Efficient Software Masking on Superscalar Pipelined Processors
Gigerl B., Primas R., Mangard S.
Advances in Cryptology - ASIACRYPT 2021
White-Box Traceable Attribute-Based Encryption with Hidden Policies and Outsourced Decryption
Ziegler D., Marsalek A., Palfinger G.
Proceedings - 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021
Online Shielding for Stochastic Systems
Könighofer B., Bloem R., Tappler M., Rudolf J., Palmisano A.
NASA Formal Methods - 13th International Symposium, NFM 2021, Proceedings
TEMPEST - Synthesis Tool for Reactive Systems and Shields in Probabilistic Environments
Pranger S., Könighofer B., Posch L., Bloem R.
Automated Technology for Verification and Analysis - 19th International Symposium, ATVA 2021, Proceedings
PRINCEv2 - More Security for (Almost) No Overhead
Božilov D., Eichlseder M., Knezevic M., Lambin B., Leander G., Moos T., Nikov V., Rasoolzadeh S., Todo Y., Wiemer F.
Selected Areas in Cryptography
Ascon v1.2: Lightweight Authenticated Encryption and Hashing
Dobraunig C., Eichlseder M., Mendel F., Schläffer M.
Journal of Cryptology, Vol. 34(3), 2021
SSI Strong Authentication using a Mobile-Phone based Identity Wallet reaching a High Level of Assurance
Abraham A., Schinnerl C., More S.
Proceedings of the 8th International Conference on Security and Cryptography (SECRYPT 2021)
Privacy-Preserving eID Derivation to Self-Sovereign Identity Systems with Offline Revocation
Abraham A., Koch K., More S., Ramacher S., Stopar M.
Proceedings - 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021
Learning Mealy Machines with One Timer
Vaandrager F., Bloem R., Ebrahimi M.
Language and Automata Theory and Applications - 15th International Conference, LATA 2021, Proceedings
Proving SIFA Protection of Masked Redundant Circuits
Hadzic V., Primas R., Bloem R.
Automated Technology for Verification and Analysis
AndroTIME: Identifying Timing Side Channels in the Android API
Palfinger G., Prünster B., Ziegler D.
Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020
Poseidon: A New Hash Function for Zero-Knowledge Proof Systems
Grassi L., Khovratovich D., Rechberger C., Roy A., Schofnegger M.
Proceedings of the 30th USENIX Security Symposium
Proving Resistance Against Infinitely Long Subspace Trails: How to Choose the Linear Layer
Grassi L., Rechberger C., Schofnegger M.
IACR Transactions on Symmetric Cryptology, Vol. 2021(2), 2021
Weak-Key Distinguishers for AES
Grassi L., Leander G., Rechberger C., Tezcan C., Wiemer F.
Selected Areas in Cryptography - 27th International Conference, 2020, Revised Selected Papers
Speculative Dereferencing: Reviving Foreshadow
Schwarzl M., Schuster T., Schwarz M., Gruß D.
2021
Remote Memory-Deduplication Attacks
Schwarzl M., Kraft E., Lipp M., Gruß D.
2021
Specfuscator: Evaluating Branch Removal as a Spectre Mitigation
Schwarzl M., Canella C., Gruß D., Schwarz M.
Financial Cryptography and Data Security - 25th International Conference, FC 2021, Revised Selected Papers
