We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Dependable Internet of Things for Networked Cars
Großwindhager B., Rupp A., Tappler M., Tranninger M., Weiser S., Aichernig B., Boano C., Horn M., Kubin G., Mangard S., Steinberger M., Römer K.
International Journal of Computing, Vol. 16(4), 2017
Note on the Robustness of CAESAR Candidates
Kales D., Eichlseder M., Mendel F.
2017
SUNFISH ID1v2 – Identity Management and Access Control at Work
Reiter A., Suzic B., Leitold H., Marsalek A., Prünster B., Ziegler D.
2017
Harmonizing Delegation Data Formats
Wagner G., Omolola O., More S.
Lecture Notes in Informatics
Transparent Memory Encryption and Authentication
Werner M., Unterluggauer T., Mangard S.
27th International Conference on Field Programmable Logic and Applications - FPL 2017
Towards a secure SCRUM process for agile web application development
Maier P., Ma Z., Bloem R.
ARES 2017 - Proceedings of the 12th International Conference on Availability, Reliability and Security
Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory
Gruß D., Lettner J., Schuster F., Ohrimenko O., Haller I., Costa M.
2017 Proceedings of the 26th USENIX Security Symposium
Cryptographic Service Providers in Current Device Landscapes: An Inconvenient Truth
Reimair F., Feichtner J., Ziegler D., Kreuzhuber S., Zefferer T.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications
STORK: a real, heterogeneous, large-scale eID management system
Ribeiro C., Leitold H., Esposito S., Mitzman D.
International Journal of Information Security, 2017
Software-based Microarchitectural Attacks
Gruß D.
Doctoral Thesis, 2017
An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics
Conti F., Schilling R., Schiavone P., Pullini A., Rossi D., Gürkaynak F., Mühlberghuber M., Gautschi M., Loi I., Haugou G., Mangard S., Benini L.
IEEE Transactions on Circuits and Systems
Side-Channel Plaintext-Recovery Attacks on Leakage-Resilient Encryption
Unterluggauer T., Werner M., Mangard S.
Design, Automation & Test in Europe Conference - DATE 2017
Leveraging the adoption of electronic identities and electronic-signature solutions in Europe
Marsalek A., Zefferer T., Reimair F., Karabat Ã., Soykan E.
32nd Annual ACM Symposium on Applied Computing, SAC 2017
ISAP - Towards Side-Channel Secure Authenticated Encryption
Dobraunig C., Eichlseder M., Mangard S., Mendel F., Unterluggauer T.
IACR Transactions on Symmetric Cryptology, Vol. 2017(1), 2017
Reconciling d+1 Masking in Hardware and Software
Groß H., Mangard S.
CHES
Higher-Order Side-Channel Protected Implementations of KECCAK
Groß H., Schaffenrath D., Mangard S.
DSD
Multi-core Data Analytics SoC with a flexible 1.76 Gbit/s AES-XTS Cryptographic Accelerator in 65 nm CMOS
Gürkaynak F., Schilling R., Mühlberghuber M., Conti F., Mangard S., Benini L.
CS2 '17, Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems
Concealing Secrets in Embedded Processors Designs
Groß H., Jelinek M., Mangard S., Unterluggauer T., Werner M.
15th Smart Card Research and Advanced Application Conference - CARDIS 2016
Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives
Unterluggauer T., Werner M., Mangard S.
ACM Asia Conference on Computer and Communications Security - ASIACCS'17
Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption
Primas R., Peßl P., Mangard S.
Cryptographic Hardware and Embedded Systems – CHES 2017
