We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Handbook of Model Checking
Clarke E., Henzinger T., Veith H., Bloem R.
Springer, 2018
Expansion-Based QBF Solving Without Recursion
Bloem R., Braud-Santoni N., Hadzic V., Egly U., Lonsing F., Seidl M.
fmcad.18
A Hierarchical Evaluation Scheme for Pilot-based Research Projects
Zefferer T.
Proceedings of the 14th International Conference on Web Information Systems and Technologies
Rasta: A Cipher with Low ANDdepth and Few ANDs per Bit
Dobraunig C., Eichlseder M., Grassi L., Lallemend V., Leander G., List E., Mendel F., Rechberger C.
Advances in Cryptology – CRYPTO 2018
Zero-Sum Partitions of PHOTON Permutations
Wang Q., Grassi L., Rechberger C.
Topics in Cryptology - CT-RSA 2018 - The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings
Cryptanalysis of MORUS
Ashur T., Eichlseder M., Lauridsen M., Leurent G., Minaud B., Rotella Y., Viguier B.
Advances in Cryptology – ASIACRYPT 2018
Clustering Related-Tweak Characteristics: Application to MANTIS-6
Eichlseder M., Kales D.
IACR Transactions on Symmetric Cryptology, Vol. 2018(2), 2018
Differential Cryptanalysis of Symmetric Primitives
Eichlseder M.
Doctoral Thesis, 2018
Automata Learning for Symbolic Execution
Aichernig B., Bloem R., Ebrahimi M., Tappler M., Winter J.
2018 Formal Methods in Computer Aided Design, FMCAD 2018, Austin, TX, USA, October 30 - November 2, 2018
A Security Analysis of FirstCoin
Marsalek A., Kollmann C., Zefferer T.
ICT Systems Security and Privacy Protection
SeDiCom
Marsalek A., Prünster B., Suzic B., Zefferer T.
Information Systems Security - 14th International Conference, ICISS 2018, Proceedings
Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices
Spreitzer R., Moonsamy V., Korak T., Mangard S.
IEEE Communications Surveys & Tutorials, Vol. 20(1), 2017
Dependable Internet of Things for Networked Cars
Großwindhager B., Rupp A., Tappler M., Tranninger M., Weiser S., Aichernig B., Boano C., Horn M., Kubin G., Mangard S., Steinberger M., Römer K.
International Journal of Computing, Vol. 16(4), 2017
Note on the Robustness of CAESAR Candidates
Kales D., Eichlseder M., Mendel F.
2017
SUNFISH ID1v2 – Identity Management and Access Control at Work
Reiter A., Suzic B., Leitold H., Marsalek A., Prünster B., Ziegler D.
2017
Harmonizing Delegation Data Formats
Wagner G., Omolola O., More S.
Lecture Notes in Informatics
Transparent Memory Encryption and Authentication
Werner M., Unterluggauer T., Mangard S.
27th International Conference on Field Programmable Logic and Applications - FPL 2017
Towards a secure SCRUM process for agile web application development
Maier P., Ma Z., Bloem R.
ARES 2017 - Proceedings of the 12th International Conference on Availability, Reliability and Security
Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory
Gruß D., Lettner J., Schuster F., Ohrimenko O., Haller I., Costa M.
2017 Proceedings of the 26th USENIX Security Symposium
Cryptographic Service Providers in Current Device Landscapes: An Inconvenient Truth
Reimair F., Feichtner J., Ziegler D., Kreuzhuber S., Zefferer T.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications
