We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Spectre attacks
Kocher P., Horn J., Fogh A., Genkin D., Gruß D., Haas W., Hamburg M., Lipp M., Mangard S., Prescher T., Schwarz M., Yarom Y.
Communications of the ACM, Vol. 63(7), 93-101
ISAP v2.0
Dobraunig C., Eichlseder M., Mangard S., Mendel F., Mennink B., Primas R., Unterluggauer T.
IACR Transactions on Symmetric Cryptology, Vol. 2020(Special Issue 1), 390-416
Meltdown
Lipp M., Schwarz M., Gruß D., Prescher T., Haas W., Horn J., Mangard S., Kocher P., Genkin D., Yarom Y., Hamburg M., Strackx R.
Communications of the ACM, Vol. 63(6), 46-56
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection
Van Bulck J., Moghimi D., Schwarz M., Lipp M., Minkin M., Genkin D., Yarom Y., Sunar B., Gruß D., Piessens F.
Proceedings - 2020 IEEE Symposium on Security and Privacy, SP 2020, 41st IEEE Symposium on Security and Privacy, 54-72, (Proceedings - IEEE Symposium on Security and Privacy; vol. 2020-May)
On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy
Grassi L., Lüftenegger R., Rechberger C., Rotaru D., Schofnegger M.
Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings, Eurocrypt 2020, 674-704, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12106 LNCS)
Plundervolt
Murdock K., Oswald D., Garcia F., Van Bulck J., Gruß D., Piessens F.
Proceedings - 2020 IEEE Symposium on Security and Privacy, SP 2020, 41st IEEE Symposium on Security and Privacy, 1466-1482
RAMBleed
Kwong A., Genkin D., Gruß D., Yarom Y.
Proceedings - 2020 IEEE Symposium on Security and Privacy, SP 2020, 41st IEEE Symposium on Security and Privacy, 695-711
Framework for faster key search using related-key higher-order differential properties
Dobraunig C., Moazami F., Rechberger C., Soleimany H.
IET Information Security, Vol. 14(2), 202-209
Efficient FPGA Implementations of LowMC and Picnic
Kales D., Ramacher S., Rechberger C., Walch R., Werner M.
Topics in Cryptology – CT-RSA 2020 - The Cryptographers Track at the RSA Conference 2020, Proceedings, Topics in Cryptology - The Cryptographer's Track at the RSA Conference 2020, 417-441, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12006 LNCS)
ConTExT: A Generic Approach for Mitigating Spectre
Schwarz M., Lipp M., Canella C., Schilling R., Kargl F., Gruß D.
Network and Distributed System Security Symposium 2020, Network and Distributed System Security Symposium 2020
Algebraic Cryptanalysis of Variants of Frit
Dobraunig C., Eichlseder M., Mendel F., Schofnegger M.
Selected Areas in Cryptography – SAC 2019 - 26th International Conference, Revised Selected Papers, 26th International Conference on Selected Areas in Cryptography, 149-170, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11959 LNCS)
Preface for the SYNT
Bloem R., Tabuada P.
Acta informatica, Vol. 57(1-2), 1
Safe Reinforcement Learning Using Probabilistic Shields
Jansen N., Könighofer B., Junges S., Serban A., Bloem R.
31st International Conference on Concurrency Theory, CONCUR 2020, 31st International Conference on Concurrency Theory, 31-316
E-Government in the Public Cloud: Requirements and Opportunities
Abraham A., Hörandner F., Zefferer T., Zwattendorfer B.
Electronic Government, Vol. 16(3), 260-280
Evaluation in Pilot-Based Research Projects: A Hierarchical Approach
Zefferer T.
Web Information Systems and Technologies - 14th International Conference, WEBIST 2018, Revised Selected Papers, 14th International Conference on Web Information Systems and Technologies, WEBIST 2018, 125-146, (Lecture Notes in Business Information Processing; vol. 372 LNBIP)
Multiply, Divide, and Conquer - Making Fully Decentralised Access Control a Reality
Prünster B., Palfinger G., Ziegler D.
Network and System Security - 14th International Conference, NSS 2020, Proceedings, 14th International Conference on Network and System Security, 311-326, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12570 LNCS)
This Selfie Does Not Exist - On the Security of Electroneum Cloud Mining
Marsalek A., Fasllija E., Ziegler D.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunication: SECRYPT, 17th International Conference on Security and Cryptography, 388-396
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC
Eichlseder M., Grassi L., Lüftenegger R., Øygarden M., Rechberger C., Schofnegger M., Wang Q.
Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, 2020, Proceedings, ASIACRYPT 2020 , 477-506, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12491 LNCS)
Protecting against Statistical Ineffective Fault Attacks
Daemen J., Dobraunig C., Eichlseder M., Groß H., Mendel F., Primas R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2020(3), 508-543
Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems
Beyne T., Canteaut A., Dinur I., Eichlseder M., Leander G., Leurent G., Naya-Plasencia M., Sasaki Y., Todo Y., Wiemer F.
Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, Proceedings, Springer, 299-328, (Lecture Notes in Computer Science; vol. 12172)