We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
STORK: a real, heterogeneous, large-scale eID management system
Ribeiro C., Leitold H., Esposito S., Mitzman D.
International Journal of Information Security, 2017
Software-based Microarchitectural Attacks
Gruß D.
Doctoral Thesis, 2017
An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics
Conti F., Schilling R., Schiavone P., Pullini A., Rossi D., Gürkaynak F., Mühlberghuber M., Gautschi M., Loi I., Haugou G., Mangard S., Benini L.
IEEE Transactions on Circuits and Systems
Side-Channel Plaintext-Recovery Attacks on Leakage-Resilient Encryption
Unterluggauer T., Werner M., Mangard S.
Design, Automation & Test in Europe Conference - DATE 2017
Leveraging the adoption of electronic identities and electronic-signature solutions in Europe
Marsalek A., Zefferer T., Reimair F., Karabat Ã., Soykan E.
32nd Annual ACM Symposium on Applied Computing, SAC 2017
ISAP - Towards Side-Channel Secure Authenticated Encryption
Dobraunig C., Eichlseder M., Mangard S., Mendel F., Unterluggauer T.
IACR Transactions on Symmetric Cryptology, Vol. 2017(1), 2017
Reconciling d+1 Masking in Hardware and Software
Groß H., Mangard S.
CHES
Higher-Order Side-Channel Protected Implementations of KECCAK
Groß H., Schaffenrath D., Mangard S.
DSD
Concealing Secrets in Embedded Processors Designs
Groß H., Jelinek M., Mangard S., Unterluggauer T., Werner M.
15th Smart Card Research and Advanced Application Conference - CARDIS 2016
Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives
Unterluggauer T., Werner M., Mangard S.
ACM Asia Conference on Computer and Communications Security - ASIACCS'17
Multi-core Data Analytics SoC with a flexible 1.76 Gbit/s AES-XTS Cryptographic Accelerator in 65 nm CMOS
Gürkaynak F., Schilling R., Mühlberghuber M., Conti F., Mangard S., Benini L.
CS2 '17, Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems
Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption
Primas R., Peßl P., Mangard S.
Cryptographic Hardware and Embedded Systems – CHES 2017
KASLR is Dead
Gruß D., Lipp M., Schwarz M., Fellner R., Maurice C., Mangard S.
Engineering Secure Software and Systems - 9th International Symposium, ESSoS 2017, Proceedings
Practical Keystroke Timing Attacks in Sandboxed JavaScript
Lipp M., Gruß D., Schwarz M., Bidner D., Maurice C., Mangard S.
Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings
Malware guard extension
Schwarz M., Weiser S., Gruß D., Maurice C., Mangard S.
Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, 2017
An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order
Groß H., Mangard S., Korak T.
Topics in Cryptology – CT-RSA 2017
Fantastic timers and where to find them
Schwarz M., Maurice C., Gruß D., Mangard S.
Financial Cryptography and Data Security - 21st International Conference, FC 2017, Revised Selected Papers
Bounded Synthesis for Streett, Rabin, and CTL*
Khalimov A., Bloem R.
CAV
A Sustainable Architecture for Secure and Usable Mobile Signature Solutions
Zefferer T.
WEBIST 2015 - Selected and Revised Papers, Springer, 343, 2017
Privacy Technologies and Policy
Schweighofer E., Leitold H., Mitrakas A., Rannenberg K.
Springer Verlag, 2017
