We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives
Chase M., Derler D., Goldfeder S., Orlandi C., Ramacher S., Rechberger C., Slamanig D., Zaverucha G.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, USA, October 30 - November 3, 2017
Cryptanalysis of Simpira v1
Eichlseder M., Dobraunig C., Mendel F.
Selected Areas in Cryptography - SAC 2016
Side-Channel Analysis of Keymill
Dobraunig C., Eichlseder M., Korak T., Mendel F.
Constructive Side-Channel Analysis and Secure Design
Model-Based Testing IoT Communication via Active Automata Learning
Tappler M., Aichernig B., Bloem R.
2017 IEEE International Conference on Software Testing, Verification and Validation (ICST)
Hybrid Mobile Edge Computing: Unleashing the Full Potential of Edge Computing in Mobile Device Use Cases
Reiter A., Prünster B., Zefferer T.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing
SUNFISH ID1v1 – Identity Management and Access Control
Reiter A., Suzic B., Leitold H., Marsalek A., Prünster B., Ziegler D.
2017
A new structural-differential property of 5-round AES
Grassi L., Rechberger C., Rønjom S.
Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
Dependability for the Internet of Things
Boano C., Römer K., Bloem R., Witrisal K., Baunach M., Horn M.
Elektrotechnik und Informationstechnik, Vol. 133(7), 2016
Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order
Groß H., Mangard S., Korak T.
ACM Workshop on Theory of Implementation Security, 3
Prefetch Side-Channel Attacks
Gruß D., Maurice C., Fogh A., Lipp M., Mangard S.
CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
Drammer
Van Der Veen V., Fratantonio Y., Lindorfer M., Gruß D., Maurice C., Vigna G., Bos H., Razavi K., Giuffrida C.
CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android
Spreitzer R., Griesmayr S., Korak T., Mangard S.
9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2016), Darmstadt, Germany
Synthesis of Self-Stabilizing and Byzantine-Resilient Distributed Systems
Braud-Santoni N., Bloem R., Jacobs S.
Computer Aided Verification - 28th International Conference, CAV 2016, Proceedings
Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript
Gruß D., Maurice C., Mangard S.
Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA)
The first reactive synthesis competition (SYNTCOMP 2014)
Jacobs S., Bloem R., Brenguier R., Ehlers R., Hell T., Könighofer R., Pérez G., Raskin J., Ryzhyk L., Sankur O., Seidl M., Tentrup L., Walker A.
International Journal on Software Tools for Technology Transfer, 2016
Flexible and Secure Resource Sharing for Mobile Augmentation Systems
Reiter A., Zefferer T.
2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering
CrySIL: Bringing Crypto to the Modern User
Reimair F., Teufl P., Zefferer T.
Web Information Systems and Technologies, Springer International Publishing, 70-90, 2016
Protecting the Control Flow of Embedded Processors against Fault Attacks
Werner M., Wenger E., Mangard S.
Smart Card Research and Advanced Applications
The second reactive synthesis competition (SYNTCOMP 2015)
Jacobs S., Bloem R., Brenguier R., Pérez G., Raskin J., Ryzhyk L., Sankur O., Seidl M., Tentrup L., Walker A., Könighofer R.
Electronic Proceedings in Theoretical Computer Science, Vol. 202, 2016
Enhancing Side-Channel Analysis of Binary-Field Multiplication with Bit Reliability
Peßl P., Mangard S.
Topics in Cryptology - CT-RSA 2016
