We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Ascon v1.2: Lightweight Authenticated Encryption and Hashing
Dobraunig C., Eichlseder M., Mendel F., Schläffer M.
Journal of Cryptology, Vol. 34(3), 2021
Privacy-Preserving eID Derivation to Self-Sovereign Identity Systems with Offline Revocation
Abraham A., Koch K., More S., Ramacher S., Stopar M.
Proceedings - 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021
Learning Mealy Machines with One Timer
Vaandrager F., Bloem R., Ebrahimi M.
Language and Automata Theory and Applications - 15th International Conference, LATA 2021, Proceedings
Proving SIFA Protection of Masked Redundant Circuits
Hadzic V., Primas R., Bloem R.
Automated Technology for Verification and Analysis
AndroTIME: Identifying Timing Side Channels in the Android API
Palfinger G., Prünster B., Ziegler D.
Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020
Poseidon: A New Hash Function for Zero-Knowledge Proof Systems
Grassi L., Khovratovich D., Rechberger C., Roy A., Schofnegger M.
Proceedings of the 30th USENIX Security Symposium
Proving Resistance Against Infinitely Long Subspace Trails: How to Choose the Linear Layer
Grassi L., Rechberger C., Schofnegger M.
IACR Transactions on Symmetric Cryptology, Vol. 2021(2), 2021
Weak-Key Distinguishers for AES
Grassi L., Leander G., Rechberger C., Tezcan C., Wiemer F.
Selected Areas in Cryptography - 27th International Conference, 2020, Revised Selected Papers
Speculative Dereferencing: Reviving Foreshadow
Schwarzl M., Schuster T., Schwarz M., Gruß D.
2021
Remote Memory-Deduplication Attacks
Schwarzl M., Kraft E., Lipp M., Gruß D.
2021
Specfuscator: Evaluating Branch Removal as a Spectre Mitigation
Schwarzl M., Canella C., Gruß D., Schwarz M.
Financial Cryptography and Data Security - 25th International Conference, FC 2021, Revised Selected Papers
Optimized Polynomial Multiplier Architectures for Post-Quantum KEM Saber
Sinha Roy S., Basso A.
2021 58th ACM/IEEE Design Automation Conference (DAC)
Automating Seccomp Filter Generation for Linux Applications
Canella C., Werner M., Gruß D., Schwarz M.
2020
Malware Guard Extension: abusing Intel SGX to conceal cache attacks
Schwarz M., Weiser S., Gruß D., Maurice C., Mangard S.
Cybersecurity, Vol. 3(1), 2020
Revocable and Offline-Verifiable Self-Sovereign Identities
Abraham A., More S., Rabensteiner C., Hörandner F.
Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020
Privacy-preserving Analytics for Data Markets using MPC
Koch K., Krenn S., Pellegrino D., Ramacher S.
2020
Short-Lived Forward-Secure Delegation for TLS
Alber L., More S., Ramacher S.
CCSW 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop
Shield Synthesis for Reinforcement Learning
Könighofer B., Bloem R., Jansen N., Lorber F.
Leveraging Applications of Formal Methods, Verification and Validation
KASLR
Canella C., Schwarz M., Haubenwallner M., Schwarzl M., Gruß D.
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020
Take A Way: Exploring the Security Implications of AMD's Cache Way Predictors
Lipp M., Hadzic V., Schwarz M., Perais A., Maurice C., Gruß D.
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020
