We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
OpenNTT - An Automated Toolchain for Compiling High-Performance NTT Accelerators in FHE
Krieger F., Hirner F., Mert A., Sinha Roy S.
Proceedings of the 43rd IEEE/ACM International Conference on Computer-Aided Design
Accelerating Isogeny Walks for VDF Evaluation
Jacquemin D., Mukherjee A., Mert A., Sinha Roy S.
IACR Communications in Crypology, Vol. 2(1), 2025
Design and Evaluation of an LLM-Based Mentor for Software Architecture in Higher Education Project Management Classes
Gürtl S., Scharf D., Thrainer C., Gütl C., Steinmaurer A.
Futureproofing Engineering Education for Global Responsibility
Manifest Problems: Analyzing Code Transparency for Android Application Bundles
Draschbacher F., Maar L.
2024 Annual Computer Security Applications Conference (ACSAC)
Credential Issuance Transparency: A Privacy-preserving Audit Log of Credential Issuance
Fasllija E., Heher J., More S.
Network and System Security. NSS 2024.
AndroPROTECT: Hardening the Android API against Fingerprinting
Palfinger G.
Network and System Security - 18th International Conference, NSS 2024, Proceedings
Final Integrated Solution and Validation Results of the ERATOSTHENES Holistic IoT Devices Security and Privacy Respecting Architecture
Loupos K., Vavilis S., Niavis H., Michalopoulos F., Dafloukas K., Skarmeta A., García J., Palomares A., Song H., Dautov R., Mancilla R., Giampaolo F., Van Landuyt D., Michiels S., More S., Xenakis C., Krilakis K.
Embedded World Conference 2025
AutoDiVer: Automatically Verifying Differential Characteristics and Learning Key Conditions
Nageler M., Ghosh S., Jüttler M., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2025(1), 2025
Skyscraper: Fast Hashing on Big Primes
Schmid F., Rechberger C., Koschatko K., Grassi L., Bouvier C., Khovratovich D., Schofnegger M.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2025(2), 2025
REED
Aikata A., Mert A., Kwon S., Deryabin M., Sinha Roy S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2025(2), 2025
Selected Areas in Cryptography - SAC 2024, Part II
Eichlseder M., Gambs S.
Springer, 2025
Selected Areas in Cryptography - SAC 2024, Part I
Eichlseder M., Gambs S.
Springer, 2025
KernelSnitch: Side-Channel Attacks on Kernel Data Structures
Maar L., Juffinger J., Steinbauer T., Gruß D., Mangard S.
Network and Distributed System Security Symposium (NDSS) 2025
Secret Spilling Drive: Leaking User Behavior through SSD Contention
Juffinger J., Rauscher F., La Manna G., Gruß D.
Network and Distributed System Security (NDSS) Symposium 2025
A Systematic Evaluation of Novel and Existing Cache Side Channels
Rauscher F., Fiedler C., Kogler A., Gruß D.
Network and Distributed System Security Symposium (NDSS) 2025
An Adaptive, Provable Correct Simplex Architecture
Maderbacher B., Schupp S., Bartocci E., Bloem R., Nickovic D., Könighofer B.
International Journal on Software Tools for Technology Transfer, 2025
TME-Box: Scalable In-Process Isolation through Intel TME-MK Memory Encryption
Unterguggenberger M., Lamster L., Schrammel D., Schwarzl M., Mangard S.
Network and Distributed System Security (NDSS) Symposium 2025
Power-Related Side-Channel Attacks using the Android Sensor Framework
Oberhuber M., Unterguggenberger M., Maar L., Kogler A., Mangard S.
Network and Distributed System Security (NDSS) Symposium 2025
On Loopy Belief Propagation for SASCAs: An Analysis and Empirical Study of the Inference Problem
Nagpal R., Cassiers G., Knoll C., Pernkopf F., Primas R., Mangard S.
IACR Communications in Crypology, Vol. 1(4), 2025
ChoiceJacking: Compromising Mobile Devices through Malicious Chargers like a Decade ago
Draschbacher F., Maar L., Oberhuber M., Mangard S.
Proceedings of the 34th USENIX Security Symposium
