We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
SHARP: Short-Window Streaming for Accurate and Robust Prediction in Motion Forecasting
Prutsch A., Fruhwirth-Reisinger C., Schinagl D., Possegger H.
IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)
webSPDZ
Buchsteiner T., Koch K., Rotaru D., Rechberger C.
Cryptology and Network Security - 24th International Conference, CANS 2025, Proceedings
Preimage-type Attacks for Reduced Ascon-Hash: Application to Ed25519
Nageler M., Schmid L., Eichlseder M.
Selected Areas in Cryptography - SAC 2025 - 32nd International Conference, Revised Selected Papers
Verifying DRAM Addressing in Software
Heckel M., Adamsky F., Juffinger J., Rauscher F., Gruß D.
Computer Security - ESORICS 2025 - 30th European Symposium on Research in Computer Security, 2025, Proceedings
Eviction Notice: Reviving and Advancing Page Cache Attacks
Neela S., Juffinger J., Maar L., Gruß D.
Network and Distributed System Security (NDSS) Symposium
Enhanced Environmental Context Encoding for Accurate Trajectory Prediction in Intralogistics
Prutsch A., Possegger H.
Proceedings of the Austrian Symposium on AI, Robotics, and Vision (AIRoV)
Attacking and Securing Hybrid Homomorphic Encryption Against Power Analysis
Aikata A., Czuprynko M., Musovic N., Salkić E., Sinha Roy S.
2026
SASTA: Single-Fault Nonce Respecting Differential Attack on Hybrid Homomorphic Encryption
Aikata A., Dabholkar A., Saha D., Sinha Roy S.
ACM AsiaCCS 2026 - Proceedings of the 21st ACM Asia Conference on Computer and Communications Security
Privacy at your Fingertips: Enabling Rapid Client-Side Operations in Fully Homomorphic Encryption
Aikata A., Krieger F., Sinha Roy S.
11th IEEE European Symposium on Security and Privacy - EuroS&P 2026
KnitSim
Kantz B., Waldert P., Schreck T., Preiner R.
18th International Symposium on Visual Information Communication and Interaction, VINCI 2025
Visual Exploration of Ontologies Supported by Language Models and Interactive Lenses
Kantz B., Waldert P., Lengauer S., Schreck T.
18th International Symposium on Visual Information Communication and Interaction, VINCI 2025
AnoScout - Visual Exploration of Anomalies and Anomaly Detection Algorithm Ensembles in Time Series Data
Rakuschek J., Leitner M., Bernard J., Wriessnegger S., Schreck T.
18th International Symposium on Visual Information Communication and Interaction, VINCI 2025
BEANIE – A 32-bit Cipher for Cryptographic Mitigations against Software Attacks
Gerhalter S., Hodžić S., Medwed M., Nageler M., Folwarczny A., Nikov V., Hoogerbrugge J., Schneider T., McConville G., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2025(4), 2025
SOF: Sorted Opacity Fields for Fast Unbounded Surface Reconstruction
Radl L., Windisch F., Deixelberger T., Hladky J., Steiner M., Schmalstieg D., Steinberger M.
SA Conference Papers '25: Proceedings of the SIGGRAPH Asia 2025 Conference Papers
Genuine PDF Forgeries
Heher J., Pichler E., More S.
IFIP Advances in Information and Communication Technology
Step by Step
Disch L., Fessl A., Franza S., Kimmerle J., Pammer-Schindler V.
Discover Education, Vol. 4(1), 2025
Don't Stop Receiving: Ensuring Availability of Critical Services on Compromised Mobile Devices
Van Eyck T., More S., Draschbacher F., Michiels S., Hughes D.
23rd IEEE International Symposium on Network Computing and Applications
Shields for Safe Reinforcement Learning
Könighofer B., Bloem R., Jansen N., Junges S., Pranger S.
Communications of the ACM, Vol. 68(11), 2025
Privacy-Preserving Visual Exploration of Healthcare Data with a Language Model Integration
Grabner M., Waldert P., Kantz B., Schreck T.
Joint Proceedings of the ECAI 2025 Workshops XAI-KRKG and UCEX-XAI, Bologna, Italy
