We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE
Grassi L., Rechberger C.
Progress in Cryptology -- INDOCRYPT 2016: 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings, Springer International Publishing AG , 322-342, 2016
Subspace Trail Cryptanalysis and its Applications to AES
Grassi L., Rechberger C., Rønjom S.
FSE 2017 - 24th International Conference on Fast Software Encryption
Analysis of the Kupyna-256 Hash Function
Dobraunig C., Eichlseder M., Mendel F.
Fast Software Encryption
Square Attack on 7-Round Kiasu-BC
Dobraunig C., Eichlseder M., Mendel F.
ACNS 2016
Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes
Dobraunig C., Eichlseder M., Korak T., Lomné V., Mendel F.
Advances in Cryptology - ASIACRYPT 2016
Synthesizing Adaptive Test Strategies from Temporal Logic Specifications
Bloem R., Könighofer R., Pill I., Röck F.
2016
Designing Reliable Cyber-Physical Systems
Aleksandrowicz G., Arbel E., Bloem R., Braak T., Devadze S., Fey G., Jenihhin M., Jutman A., Kerkoff H., Könighofer R., Malburg J., Moran S., Raik J., Rauwerda G., Riener H., Röck F., Shibin K., Sunesen K., Wan J., Zhao Y.
2016 Forum on Specification and Design Languages (FDL)
Towards a Personal Security Device
Rath C., Niedermair T., Zefferer T.
Security and Trust Management
Haraka v2 - Efficient Short-Input Hashing for Post-Quantum Applications
Kölbl S., Lauridsen M., Mendel F., Rechberger C.
IACR Transactions on Symmetric Cryptology, Vol. 2016(2), 2016
MPC-Friendly Symmetric Key Primitives
Grassi L., Rechberger C., Rotaru D., Scholl P., Smart N.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity
Albrecht M., Grassi L., Rechberger C., Roy A., Tiessen T.
Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I
Practical Key Recovery Attack on MANTIS-5
Dobraunig C., Eichlseder M., Kales D., Mendel F.
IACR Transactions on Symmetric Cryptology, Vol. 2016(2), 2016
SUNFISH D2.2 – Requirement Definition and Threat Model
Reiter A., Suzic B., Leitold H., Cassar J., Nicoletti L., Rozenberg B., Jones C.
2015
SUNFISH D2.1 – State of the Art and Legal Aspects
Reiter A., Leitold H., Suzic B., Reimair F., Moffie M., Cordina D., Pullonen P., Pettai M., Kubo B., Venturi D.
2015
Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches
Gruß D., Spreitzer R., Mangard S.
24th USENIX Security Symposium, Washington, D.C., USA, August 12-14, 2015
Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security
Dobraunig C., Koeune F., Mangard S., Mendel F., Standaert F.
CARDIS
Decidability of Parameterized Verification
Khalimov A., Bloem R., Veith H., Widder J., Konnov I., Rubin S., Jacobs S.
2015
Case Study: Automatic Test Case Generation for a Secure Cache Implementation
Bloem R., Hein D., Röck F., Schumi R.
International Conference on Tests And Proofs
Practical memory deduplication attacks in sandboxed javascript
Gruß D., Bidner D., Mangard S.
Computer Security – ESORICS 2015 - 20th European Symposium on Research in Computer Security, Proceedings
Leveraging the Adoption of Mobile eID and e-Signature Solutions in Europe
Zefferer T., Teufl P.
Electronic Government and the Information Systems Perspective
