We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Microarchitectural Attacks and Defenses for Isolated Domains
Giner L.
Doctoral Thesis, 2025
OnSET: Ontology and Semantic Exploration Toolkit
Kantz B., Innerebner K., Waldert P., Lengauer S., Lex E., Schreck T.
SIGIR 2025 - Proceedings of the 48th International ACM SIGIR Conference on Research and Development in Information Retrieval
Cohere+Reload: Re-enabling High-Resolution Cache Attacks on AMD SEV-SNP
Giner L., Neela S., Gruß D.
Detection of Intrusions and Malware, and Vulnerability Assessment
The HMB Timing Side Channel: Exploiting the SSD's Host Memory Buffer
Juffinger J., Weissteiner H., Steinbauer T., Gruß D.
Detection of Intrusions and Malware, and Vulnerability Assessment - 22st International Conference, DIMVA 2025, Proceedings
Simple Power Analysis Attack on SQIsign
Mukherjee A., Czuprynko M., Jacquemin D., Kutas P., Sinha Roy S.
Progress in Cryptology - AFRICACRYPT 2025
Correlation power analysis of LESS and CROSS
Czuprynko M., Mukherjee A., Sinha Roy S.
Progress in Cryptology - AFRICACRYPT 2025
Constant-time Integer Arithmetic for SQIsign
Kouider F., Mukherjee A., Jacquemin D., Kutas P.
Progress in Cryptology - AFRICACRYPT 2025
Real-World Study of the Security of Educational Test Systems
Gast S., Felix S., Steinmaurer A., Juffinger J., Gruß D.
10th IEEE European Symposium on Security and Privacy, Workshop Proceedings
Not So Secure TSC
Juffinger J., Neela S., Gruß D.
Applied Cryptography and Network Security
Poseidon and Neptune
Grassi L., Koschatko K., Rechberger C.
IACR Transactions on Symmetric Cryptology, Vol. 2025(2), 2025
ToFA: Towards Fault Analysis of GIFT and GIFT-like Ciphers Leveraging Truncated Impossible Differentials
Kundu A., Ghosh S., Aikata A., Saha D.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2025(3), 2025
Guided Visual Analysis of Time Series Data with Spiral Views and View Quality Measures
Stoppacher S., Rakuschek J., Schreck T.
EuroVA 2025 - EuroVis Workshop on Visual Analytics
Visual Fingerprints of Vibration Signals Using Time Delay Embeddings
Rakuschek J., Boesze A., Schmidt J., Schreck T.
EuroVis 2025 - Short Papers
Exploring the Foundations of Artificial Intelligence in Secondary Education – A Workshop-Based Study
Keller S., Kandlhofer M., Steinbauer-Wagner G.
Learning and Collaboration Technologies
Future-Proof Asynchronous IoT Backups: An Evaluation of Secure IoT Data Recovery Considering Post-Quantum Threats
Shvets D., Fasllija E., Heher J., More S.
ICT Systems Security and Privacy Protection. SEC 2025.
Pasta on Edge: Cryptoprocessor for Hybrid Homomorphic Encryption
Aikata A., Sanz Sobrino D., Sinha Roy S.
2025 Design, Automation and Test in Europe Conference, DATE 2025 - Proceedings
Spectre
Gruß D.
Encyclopedia of Cryptography, Security and Privacy, Third Edition, Springer, Cham, 2497-2503, 2025
LEAP: A Fast, Lattice-based OPRF with Application to Private Set Intersection
Heimberger L., Kales D., Lolato R., Mir O., Ramacher S., Rechberger C.
Advances in Cryptology – EUROCRYPT 2025 - 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
Exploring Large Integer Multiplication for Cryptography Targeting In-Memory Computing
Krieger F., Hirner F., Sinha Roy S.
2025 Design, Automation and Test in Europe Conference, DATE 2025 - Proceedings
