We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Not So Secure TSC
Juffinger J., Neela S., Gruß D.
Applied Cryptography and Network Security
Poseidon and Neptune
Grassi L., Koschatko K., Rechberger C.
IACR Transactions on Symmetric Cryptology, Vol. 2025(2), 2025
ToFA: Towards Fault Analysis of GIFT and GIFT-like Ciphers Leveraging Truncated Impossible Differentials
Kundu A., Ghosh S., Aikata A., Saha D.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2025(3), 2025
Preimage-type Attacks for Reduced Ascon-Hash: Application to Ed25519
Nageler M., Schmid L., Eichlseder M.
Selected Areas in Cryptography – SAC 2025
Guided Visual Analysis of Time Series Data with Spiral Views and View Quality Measures
Stoppacher S., Rakuschek J., Schreck T.
EuroVA 2025
Visual Fingerprints of Vibration Signals Using Time Delay Embeddings
Rakuschek J., Boesze A., Schmidt J., Schreck T.
EuroVis 2025 - Short Papers
Exploring the Foundations of Artificial Intelligence in Secondary Education – A Workshop-Based Study
Keller S., Kandlhofer M., Steinbauer-Wagner G.
Learning and Collaboration Technologies
Future-Proof Asynchronous IoT Backups: An Evaluation of Secure IoT Data Recovery Considering Post-Quantum Threats
Shvets D., Fasllija E., Heher J., More S.
ICT Systems Security and Privacy Protection. SEC 2025.
LEAP: A Fast, Lattice-based OPRF with Application to Private Set Intersection
Heimberger L., Kales D., Lolato R., Mir O., Ramacher S., Rechberger C.
Advances in Cryptology – EUROCRYPT 2025 - 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
Exploring Large Integer Multiplication for Cryptography Targeting In-Memory Computing
Krieger F., Hirner F., Sinha Roy S.
2025 Design, Automation and Test in Europe Conference, DATE 2025 - Proceedings
Fairness Shields: Safeguarding against Biased Decision Makers
Cano Cordoba F., Henzinger T., Könighofer B., Kueffner K., Mallik K.
Proceedings of the AAAI Conference on Artificial Intelligence
OpenNTT - An Automated Toolchain for Compiling High-Performance NTT Accelerators in FHE
Krieger F., Hirner F., Mert A., Sinha Roy S.
Proceedings of the 43rd IEEE/ACM International Conference on Computer-Aided Design
Accelerating Isogeny Walks for VDF Evaluation
Jacquemin D., Mukherjee A., Mert A., Sinha Roy S.
IACR Communications in Crypology, Vol. 2(1), 2025
Efficient SPA Countermeasures using Redundant Number Representation with Application to ML-KEM
Nagpal R., Hadzic V., Primas R., Mangard S.
Selected Areas of Cryptography (SAC) 2025
Design and Evaluation of an LLM-Based Mentor for Software Architecture in Higher Education Project Management Classes
Gürtl S., Scharf D., Thrainer C., Gütl C., Steinmaurer A.
Futureproofing Engineering Education for Global Responsibility
Credential Issuance Transparency: A Privacy-preserving Audit Log of Credential Issuance
Fasllija E., Heher J., More S.
Network and System Security. NSS 2024.
Final Integrated Solution and Validation Results of the ERATOSTHENES Holistic IoT Devices Security and Privacy Respecting Architecture
Loupos K., Vavilis S., Niavis H., Michalopoulos F., Dafloukas K., Skarmeta A., García J., Palomares A., Song H., Dautov R., Mancilla R., Giampaolo F., Van Landuyt D., Michiels S., More S., Xenakis C., Krilakis K.
Embedded World Conference 2025
AutoDiVer: Automatically Verifying Differential Characteristics and Learning Key Conditions
Nageler M., Ghosh S., Jüttler M., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2025(1), 2025
Skyscraper: Fast Hashing on Big Primes
Schmid F., Rechberger C., Koschatko K., Grassi L., Bouvier C., Khovratovich D., Schofnegger M.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2025(2), 2025
