We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
MPC-Friendly Symmetric Key Primitives
Grassi L., Rechberger C., Rotaru D., Scholl P., Smart N.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity
Albrecht M., Grassi L., Rechberger C., Roy A., Tiessen T.
Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I
Practical Key Recovery Attack on MANTIS-5
Dobraunig C., Eichlseder M., Kales D., Mendel F.
IACR Transactions on Symmetric Cryptology, Vol. 2016(2), 2016
SUNFISH D2.2 – Requirement Definition and Threat Model
Reiter A., Suzic B., Leitold H., Cassar J., Nicoletti L., Rozenberg B., Jones C.
2015
SUNFISH D2.1 – State of the Art and Legal Aspects
Reiter A., Leitold H., Suzic B., Reimair F., Moffie M., Cordina D., Pullonen P., Pettai M., Kubo B., Venturi D.
2015
Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches
Gruß D., Spreitzer R., Mangard S.
24th USENIX Security Symposium, Washington, D.C., USA, August 12-14, 2015
Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security
Dobraunig C., Koeune F., Mangard S., Mendel F., Standaert F.
CARDIS
Decidability of Parameterized Verification
Khalimov A., Bloem R., Veith H., Widder J., Konnov I., Rubin S., Jacobs S.
2015
Practical memory deduplication attacks in sandboxed javascript
Gruß D., Bidner D., Mangard S.
Computer Security – ESORICS 2015 - 20th European Symposium on Research in Computer Security, Proceedings
Case Study: Automatic Test Case Generation for a Secure Cache Implementation
Bloem R., Hein D., Röck F., Schumi R.
International Conference on Tests And Proofs
Leveraging the Adoption of Mobile eID and e-Signature Solutions in Europe
Zefferer T., Teufl P.
Electronic Government and the Information Systems Perspective
Towards Transactional Electronic Services on Mobile End-User Devices - A Sustainable Architecture for Mobile Signature Solutions
Zefferer T.
11th International Conference on Web Information Systems and Technologies
Towards a New Generation of Mobile Government
Zefferer T.
13th International Conference on e-Society 2015
Shield Synthesis: - Runtime Enforcement for Reactive Systems
Bloem R., Könighofer B., Könighofer R., Wang C.
Tools and Algorithms for the Construction and Analysis of Systems (TACAS) - 21st International Conference
Games for BCI Skill Learning
Scherer R., Müller-Putz G., Friedrich E., Pammer-Schindler V., Wilding K., Keller S., Pirker J.
Handbook of Digital Games and Entertainment Technologies, 1-19, 2015
Designing for Engaging BCI Training: A Jigsaw Puzzle
Pammer-Schindler V., Simon J., Wilding K., Keller S., Scherer R.
CHI PLAY '15
Fortgeschrittene PDF Signaturen mit PAdES
Fitzek A., Maierhofer C., Tauber A., Zwattendorfer B.
eGovernment Review, 2015
Java Privacy Guard - The OpenPGP Message Format and an Implementation in Java
More S.
Bachelor's Thesis, 2015
Analysis of SHA-512/224 and SHA-512/256
Dobraunig C., Eichlseder M., Mendel F.
Advances in Cryptology - ASIACRYPT 2015
Higher-Order Cryptanalysis of LowMC
Dobraunig C., Eichlseder M., Mendel F.
Information Security and Cryptology - ICISC 2015
