We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Code Encryption with Intel TME-MK for Control-Flow Enforcement
Unterguggenberger M., Lamster L., Oberhuber M., Scherer S., Mangard S.
30th European Symposium on Research in Computer Security (ESORICS) 2025, 30th European Symposium on Research in Computer Security, ESORICS 2025
Tools at the Frontiers of Quantitative Verification
Andriushchenko R., Bork A., Budde C., Češka M., Grover K., Hahn E., Hartmanns A., Israelsen B., Jansen N., Jeppson J., Junges S., Köhl M., Könighofer B., Křetínský J., Meggendorfer T., Parker D., Pranger S., Quatmann T., Ruijters E., Taylor L., Volk M., Weininger M., Zhang Z.
TOOLympics Challenge 2023 - Updates, Results, Successes of the Formal-Methods Competitions, 30th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, 90–146, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14550 LNCS)
Shields for Safe Reinforcement Learning
Könighofer B., Bloem R., Jansen N., Junges S., Pranger S.
Communications of the ACM
Learning to Predict Mixed-Traffic Trajectories in Urban Scenarios from Little Training Data with Refined Environment Modeling
Prutsch A., Possegger H.
Proceedings of the IEEE Intelligent Vehicles Symposium (IV)
Lanes Are Not Enough: Enhancing Trajectory Prediction in Intralogistics Through Detailed Environmental Context
Prutsch A., Wess M., Possegger H.
Proceedings of the International Conference on Intelligent Robots and Systems (IROS), IEEE/RSJ International Conference on Intelligent Robots and Systems, IROS 2025
Leveraging Foundation Models for Labeling Custom Object Masks in LiDAR Point Cloud Sequences
Prutsch A., Schustereder M., Possegger H.
Proceedings of the European Conference on Mobile Robots (ECMR), 12th European Conference on Mobile Robots, ECMR 2025
Input Uncertainty Attribution by Uncertainty Propagation
Kantz B., Steger S., Staudinger C., Feilmayr C., Wachlmayr J., Haberl A., Schuster S., Pernkopf F.
ICASSP
Synthesis of Controllers for Continuous Blackbox Systems
Maderbacher B., Windisch F., Larrauri Borroto L., Bloem R.
Verification, Model Checking, and Abstract Interpretation - 26th International Conference, VMCAI 2025, Proceedings, 26th International Conference on Verification, Model Checking, and Abstract Interpretation, VMCAI 2025, 137–159, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 15530 LNCS)
SoK: Computational and Distributed Differential Privacy for MPC
Meisingseth F., Rechberger C.
Proceedings on Privacy Enhancing Technologies, 25th Privacy Enhancing Technologies Symposium, PETS 2025, 420-439
Practical Two-party Computational Differential Privacy with Active Security
Meisingseth F., Rechberger C., Schmid F.
Proceedings on Privacy Enhancing Technologies, 25th Privacy Enhancing Technologies Symposium, PETS 2025, 341-360
One Tree to Rule Them All
Baum C., Beullens W., Mukherjee S., Orsini E., Ramacher S., Rechberger C., Roy L., Scholl P.
Advances in Cryptology – ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, 30th Annual International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, 463-493, (Lecture Notes in Computer Science; vol. 15484 LNCS)
b4M: Holistic Benchmarking for MPC
Koch K., Rechberger C., Rotaru D.
Availability, Reliability and Security. ARES 2025, 20th International Conference on Availability, Reliability and Security, ARES 2025, 201-216, (Lecture Notes in Computer Science; vol. 15998 LNCS)
PASTA on Edge: Cryptoprocessor for Hybrid Homomorphic Encryption
Aikata A., Sanz Sobrino D., Sinha Roy S.
DATE: Design, Automation and Test in Europe Conference, 2025 Design, Automation and Test in Europe Conference: DATE 2025
REED: Chiplet-Based Scalable Hardware Accelerator for Fully Homomorphic Encryption
Aikata A., Mert A., Kwon S., Deryabin M., Sinha Roy S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2025(2)
Simple Power Analysis Attack on SQIsign
Mukherjee A., Czuprynko M., Jacquemin D., Kutas P., Sinha Roy S.
Africacrypt 2025, 16th International Conference on Cryptology, Progress in Cryptology - AFRICACRYPT 2025
Correlation power analysis of LESS and CROSS
Czuprynko M., Mukherjee A., Sinha Roy S.
Africacrypt 2025, 16th International Conference on Cryptology, Progress in Cryptology - AFRICACRYPT 2025
Revisiting module-lattice based homomorphic encryption and application to secure-MPC
Mukherjee A., Sinha Roy S.
IACR Communications in Crypology, Vol. 2(2)
Constant-time Integer Arithmetic for SQIsign
Kouider F., Mukherjee A., Jacquemin D., Kutas P.
Africacrypt 2025, 16th International Conference on Cryptology, Progress in Cryptology - AFRICACRYPT 2025
Exploring the Six Worlds of Gröbner Basis Cryptanalysis: Application to Anemoi
Koschatko K., Lüftenegger R., Rechberger C.
IACR Transactions on Symmetric Cryptology, Vol. 2024(4), 138-190