We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Exploring the Foundations of Artificial Intelligence in Secondary Education – A Workshop-Based Study
Keller S., Kandlhofer M., Steinbauer-Wagner G.
Learning and Collaboration Technologies , 12th International Conference on Learning and Collaboration Technologies, LCT 2025, held as part of the 27th HCI International Conference, HCII 2025, 93-104, (Lecture Notes in Computer Science; vol. 15807 LNCS)
Future-Proof Asynchronous IoT Backups: An Evaluation of Secure IoT Data Recovery Considering Post-Quantum Threats
Shvets D., Fasllija E., Heher J., More S.
ICT Systems Security and Privacy Protection. SEC 2025., 40th International Conference on ICT Systems Security and Privacy Protection, IFIP SEC 2025, 34-48, (IFIP Advances in Information and Communication Technology; vol. 746 IFIPAICT)
LEAP: A Fast, Lattice-based OPRF with Application to Private Set Intersection
Heimberger L., Kales D., Lolato R., Mir O., Ramacher S., Rechberger C.
Advances in Cryptology – EUROCRYPT 2025 - 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings, Eurocrypt 2025, 254-283, (Lecture Notes in Computer Science; vol. 15607 LNCS)
Exploring Large Integer Multiplication for Cryptography Targeting In-Memory Computing
Krieger F., Hirner F., Sinha Roy S.
2025 Design, Automation and Test in Europe Conference, DATE 2025 - Proceedings, 2025 Design, Automation and Test in Europe Conference: DATE 2025, 1-7, (Proceedings -Design, Automation and Test in Europe, DATE)
BISON: Blind Identification with Stateless scOped pseudoNyms
Heher J., More S., Heimberger L.
Proceedings of the 2025 ACM Asia Conference on Computer and Communications Security, 20th ACM ASIA Conference on Computer and Communications Security
Fairness Shields: Safeguarding against Biased Decision Makers
Cano Cordoba F., Henzinger T., Könighofer B., Kueffner K., Mallik K.
Proceedings of the AAAI Conference on Artificial Intelligence, AAAI Press, 15659-15668, (Proceedings of the AAAI Conference on Artificial Intelligence)
OpenNTT - An Automated Toolchain for Compiling High-Performance NTT Accelerators in FHE
Krieger F., Hirner F., Mert A., Sinha Roy S.
Proceedings of the 43rd IEEE/ACM International Conference on Computer-Aided Design, ACM/IEEE, (IEEE/ACM International Conference on Computer-Aided Design, Digest of Technical Papers, ICCAD)
Cohere+Reload: Re-enabling High-Resolution Cache Attacks on AMD SEV-SNP
Giner L., Neela S., Gruß D.
DIMVA, 22nd International Conference on Detection of Intrusions and Malware, and Vulnerability Assess, DIMVA 2025
Accelerating Isogeny Walks for VDF Evaluation
Jacquemin D., Mukherjee A., Mert A., Sinha Roy S.
IACR Communications in Crypology, Vol. 2(1)
Efficient SPA Countermeasures using Redundant Number Representation with Application to ML-KEM
Nagpal R., Hadzic V., Primas R., Mangard S.
Selected Areas of Cryptography (SAC) 2025, 32nd Selected Areas in Cryptography, SAC 2025
Design and Evaluation of an LLM-Based Mentor for Software Architecture in Higher Education Project Management Classes
Gürtl S., Scharf D., Thrainer C., Gütl C., Steinmaurer A.
Futureproofing Engineering Education for Global Responsibility, 27th International Conference on Interactive Collaborative Learning, ICL 2024, 375-386, (Lecture Notes in Networks and Systems; vol. 1280 LNNS)
Final Integrated Solution and Validation Results of the ERATOSTHENES Holistic IoT Devices Security and Privacy Respecting Architecture
Loupos K., Vavilis S., Niavis H., Michalopoulos F., Dafloukas K., Skarmeta A., García J., Palomares A., Song H., Dautov R., Mancilla R., Giampaolo F., Van Landuyt D., Michiels S., More S., Xenakis C., Krilakis K.
Embedded World Conference 2025, Embedded World 2025
AutoDiVer: Automatically Verifying Differential Characteristics and Learning Key Conditions
Nageler M., Ghosh S., Jüttler M., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2025(1), 471-514
Skyscraper: Fast Hashing on Big Primes
Schmid F., Rechberger C., Koschatko K., Grassi L., Bouvier C., Khovratovich D., Schofnegger M.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2025(2), 743-780
REED
Aikata A., Mert A., Kwon S., Deryabin M., Sinha Roy S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2025(2), 163-208
Selected Areas in Cryptography - SAC 2024, Part II
Eichlseder M., Gambs S.
, Springer, (Lecture Notes in Computer Science; vol. 15517 LNCS)
Selected Areas in Cryptography - SAC 2024, Part I
Eichlseder M., Gambs S.
, Springer, (Lecture Notes in Computer Science; vol. 15516 LNCS)
KernelSnitch: Side-Channel Attacks on Kernel Data Structures
Maar L., Juffinger J., Steinbauer T., Gruß D., Mangard S.
Network and Distributed System Security Symposium (NDSS) 2025, Network and Distributed System Security Symposium 2025
A Systematic Evaluation of Novel and Existing Cache Side Channels
Rauscher F., Fiedler C., Kogler A., Gruß D.
Network and Distributed System Security Symposium (NDSS) 2025, Network and Distributed System Security Symposium 2025
Secret Spilling Drive: Leaking User Behavior through SSD Contention
Juffinger J., Rauscher F., La Manna G., Gruß D.
Network and Distributed System Security (NDSS) Symposium 2025, Network and Distributed System Security Symposium 2025