We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
MPC-Friendly Symmetric Key Primitives
Grassi L., Rechberger C., Rotaru D., Scholl P., Smart N.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity
Albrecht M., Grassi L., Rechberger C., Roy A., Tiessen T.
Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I
Practical Key Recovery Attack on MANTIS-5
Dobraunig C., Eichlseder M., Kales D., Mendel F.
IACR Transactions on Symmetric Cryptology, Vol. 2016(2), 2016
SUNFISH D2.2 – Requirement Definition and Threat Model
Reiter A., Suzic B., Leitold H., Cassar J., Nicoletti L., Rozenberg B., Jones C.
2015
SUNFISH D2.1 – State of the Art and Legal Aspects
Reiter A., Leitold H., Suzic B., Reimair F., Moffie M., Cordina D., Pullonen P., Pettai M., Kubo B., Venturi D.
2015
Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches
Gruß D., Spreitzer R., Mangard S.
24th USENIX Security Symposium, Washington, D.C., USA, August 12-14, 2015
Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security
Dobraunig C., Koeune F., Mangard S., Mendel F., Standaert F.
CARDIS
Leveraging the Adoption of Mobile eID and e-Signature Solutions in Europe
Zefferer T., Teufl P.
Electronic Government and the Information Systems Perspective
Practical memory deduplication attacks in sandboxed javascript
Gruß D., Bidner D., Mangard S.
Computer Security – ESORICS 2015 - 20th European Symposium on Research in Computer Security, Proceedings
Decidability of Parameterized Verification
Khalimov A., Bloem R., Veith H., Widder J., Konnov I., Rubin S., Jacobs S.
2015
Case Study: Automatic Test Case Generation for a Secure Cache Implementation
Bloem R., Hein D., Röck F., Schumi R.
International Conference on Tests And Proofs
Towards Transactional Electronic Services on Mobile End-User Devices - A Sustainable Architecture for Mobile Signature Solutions
Zefferer T.
11th International Conference on Web Information Systems and Technologies
Towards a New Generation of Mobile Government
Zefferer T.
13th International Conference on e-Society 2015
Shield Synthesis: - Runtime Enforcement for Reactive Systems
Bloem R., Könighofer B., Könighofer R., Wang C.
Tools and Algorithms for the Construction and Analysis of Systems (TACAS) - 21st International Conference
Games for BCI Skill Learning
Scherer R., Müller-Putz G., Friedrich E., Pammer-Schindler V., Wilding K., Keller S., Pirker J.
Handbook of Digital Games and Entertainment Technologies, 1-19, 2015
Designing for Engaging BCI Training: A Jigsaw Puzzle
Pammer-Schindler V., Simon J., Wilding K., Keller S., Scherer R.
CHI PLAY '15
In Certificates We Trust - Revisited
Reimair F., Teufl P., Prünster B.
Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
Attribute-based Encryption goes X.509
Reimair F., Feichtner J., Teufl P.
IEEE International Conference on e-Business Engineering (ICEBE)
WebCrySIL - Web Cryptographic Service Interoperability Layer
Reimair F., Teufl P., Zefferer T.
11th International Conference on Web Information Systems and Technologies
Fortgeschrittene PDF Signaturen mit PAdES
Fitzek A., Maierhofer C., Tauber A., Zwattendorfer B.
eGovernment Review, 2015
