We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Attacking and Securing Hybrid Homomorphic Encryption Against Power Analysis
Aikata A., Czuprynko M., Musovic N., Salkić E., Sinha Roy S.
2026
KnitSim
Kantz B., Waldert P., Schreck T., Preiner R.
18th International Symposium on Visual Information Communication and Interaction, VINCI 2025
Visual Exploration of Ontologies Supported by Language Models and Interactive Lenses
Kantz B., Waldert P., Lengauer S., Schreck T.
18th International Symposium on Visual Information Communication and Interaction, VINCI 2025
AnoScout - Visual Exploration of Anomalies and Anomaly Detection Algorithm Ensembles in Time Series Data
Rakuschek J., Leitner M., Bernard J., Wriessnegger S., Schreck T.
18th International Symposium on Visual Information Communication and Interaction, VINCI 2025
BEANIE – A 32-bit Cipher for Cryptographic Mitigations against Software Attacks
Gerhalter S., Hodžić S., Medwed M., Nageler M., Folwarczny A., Nikov V., Hoogerbrugge J., Schneider T., McConville G., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2025(4), 2025
SOF: Sorted Opacity Fields for Fast Unbounded Surface Reconstruction
Radl L., Windisch F., Deixelberger T., Hladky J., Steiner M., Schmalstieg D., Steinberger M.
Proceedings of the SIGGRAPH Asia 2025 Conference Papers
Genuine PDF Forgeries
Heher J., Pichler E., More S.
IFIP Advances in Information and Communication Technology
Step by Step
Disch L., Fessl A., Franza S., Kimmerle J., Pammer-Schindler V.
Discover Education, Vol. 4(1), 2025
Don't Stop Receiving: Ensuring Availability of Critical Services on Compromised Mobile Devices
Van Eyck T., More S., Draschbacher F., Michiels S., Hughes D.
23rd IEEE International Symposium on Network Computing and Applications
Privacy-Preserving Visual Exploration of Healthcare Data with a Language Model Integration
Grabner M., Waldert P., Kantz B., Schreck T.
Joint Proceedings of the ECAI 2025 Workshops XAI-KRKG and UCEX-XAI, Bologna, Italy
Shields for Safe Reinforcement Learning
Könighofer B., Bloem R., Jansen N., Junges S., Pranger S.
Communications of the ACM, Vol. 68(11), 2025
WaitWatcher and WaitGuard
Lamster L., Rauscher F., Unterguggenberger M., Mangard S.
Computer Security – ESORICS 2025
Epistemology of Rowhammer Attacks: Threats to Rowhammer Research Validity
Heckel M., Weissteiner H., Adamsky F., Gruß D.
Computer Security – ESORICS 2025
FHERMA Cookbook: FHE Components for Privacy-Preserving Applications
Adamek J., Aikata A., Al Badawi A., Alexandru A., Arakelov A., Arakelov G., Binfet P., Correa V., Dumezy J., Gomenyuk S., Kononova V., Lekomtsev D., Maloney V., Nguyen C., Polyakov Y., Pianykh D., Shaul H., Schulze Darup M., Teichrib D., Tronin D.
WAHC 2025 - Proceedings of the 13th Workshop on Encrypted Computing and Applied Homomorphic Cryptography
Zero-Click SnailLoad: From Minimal to No User Interaction
Gast S., Puntigam N., Franza S., Neela S., Gruß D., Ullrich J.
Computer Security – ESORICS 2025
Cache Timing Leakages in Zero-Knowledge Protocols
Mukherjee S., Rechberger C., Schofnegger M.
7th Conference on Advances in Financial Technologies
Scalable visual exploration of time series and anomalies with adaptive level of detail
Rakuschek J., Suschnigg J., Louis P., Mutlu B., Schreck T.
Information Visualization, Vol. 24(4), 2025
Kernel Security in the Wild
Maar L.
Doctoral Thesis, 2025
Special Issue on Open Hardware for Embedded System Security and Cryptography
Tempelmeier M., De Santis F., Bhasin S., Mangard S.
ACM Transactions on Embedded Computing Systems, Vol. 24(5), 2025
