We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Secure and Efficient Outsourced Matrix Multiplication with Homomorphic Encryption
Aikata A., Sinha Roy S.
Indocrypt 2024, Indocrypt 2024
Robustness of Explainable Artificial Intelligence in Industrial Process Modelling
Kantz B., Staudinger C., Feilmayr C., Wachlmayr J., Haberl A., Schuster S., Pernkopf F.
ICML'24 Workshop ML for Life and Material Science: From Theory to Industry Applications, ICML'24 Workshop ML for Life and Material Science: From Theory to Industry Applications
Quantile: Quantifying Information Leakage
Hadzic V., Cassiers G., Primas R., Mangard S., Bloem R.
DOPE: DOmain Protection Enforcement with PKS
Maar L., Schwarzl M., Rauscher F., Gruß D., Mangard S.
Proceedings - 39th Annual Computer Security Applications Conference, ACSAC 2023, 2023 Annual Computer Security Applications Conference, 662-676, (ACM International Conference Proceeding Series)
Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency
Gigerl B., Klug F., Mangard S., Mendel F., Primas R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(1), 309-335
Quantile: Quantifying Information Leakage
Hadzic V., Cassiers G., Primas R., Mangard S., Bloem R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(1), 433-456
Learning Mealy machines with one timer
Vaandrager F., Ebrahimi M., Bloem R.
Information and Computation, Vol. 295
Trust and Privacy in a Heterogeneous World
More S.
, Doctoral Thesis
Cryptographically Enforced Memory Safety
Unterguggenberger M., Schrammel D., Lamster L., Nasahl P., Mangard S.
CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 30th ACM Conference on Computer and Communications Security, 889-903, (CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security)
Improved Search for Integral, Impossible-Differential and Zero-Correlation Attacks
Hadipour H., Gerhalter S., Sadeghi S., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2024(1)
High-speed SABER Key Encapsulation Mechanism in 65nm CMOS
Imran M., Almeida F., Basso A., Sinha Roy S., Pagliarini S.
Journal of Cryptographic Engineering, Vol. 13(4), 461-471
Meta Form: Co-Creating Open Architectures
Grass A., Parger A.
Projects ACADIA Proceedings 2023, ACADIA 2023, 63-67
Collaborative Recommendation of Search Heuristics For Constraint Solvers
Garber D., Burgstaller T., Felfernig A., Le V., Lubos S., Tran T., Polat Erdeniz S.
, 38-44
CacheWarp: Software-based Fault Injection using Selective State Reset
Zhang R., Gerlach L., Weber D., Hetterich L., Lü Y., Kogler A., Schwarz M.
Proceedings of the 33nd USENIX Security Symposium, 33rd USENIX Security Symposium: USENIX Security 2024
FMTESTING: A FEATUREIDE Plug-in for Automated Feature Model Analysis and Diagnosis
Burgstaller T., Le V., Tran T., Felfernig A.
ECAI 2023 - 26th European Conference on Artificial Intelligence, including 12th Conference on Prestigious Applications of Intelligent Systems, PAIS 2023 - Proceedings, 26th European Conference on Artificial Intelligence , 3190 - 3195, (Frontiers in Artificial Intelligence and Applications; vol. 372)
Decentralized Participation and Agency in Digital Art and Architecture, An Exploration of Pixel and Voxel-Based Case Studies
Grass A.
eCAADe 2023 - Digital Design Reconsidered, 41st Conference on Education and Research in Computer Aided Architectural Design in Europe, 691-700
The QARMAv2 Family of Tweakable Block Ciphers
Avanzi R., Banik S., Dunkelman O., Eichlseder M., Ghosh S., Nageler M., Regazzoni F.
IACR Transactions on Symmetric Cryptology, Vol. 2023(3), 25-73
Finding the Impossible: Automated Search for Full Impossible-Differential, Zero-Correlation, and Integral Attacks
Hadipour H., Sadeghi S., Eichlseder M.
Advances in Cryptology – EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2023, Proceedings, 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 128-157, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2023)
Trust Scheme Interoperability: Connecting Heterogeneous Trust Schemes
More S.
ARES 2023 - 18th International Conference on Availability, Reliability and Security, Proceedings, The 18th International Conference on Availability, Reliability and Security, 1173-1181, (ACM International Conference Proceeding Series)
An inclusive Lifecycle Approach for IoT Devices Trust and Identity Management
Loupos K., Niavis H., Michalopoulos F., Misiakoulis G., Skarmeta A., García J., Palomares A., Song H., Dautov R., Giampaolo F., Mancilla R., Costantino F., Van Landuyt D., Michiels S., More S., Xenakis C., Bampatsikos M., Politis I., Krilakis K., Syvridis D.
ARES 2023 - 18th International Conference on Availability, Reliability and Security, Proceedings, The 18th International Conference on Availability, Reliability and Security, (ACM International Conference Proceeding Series)