We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Presshammer: Rowhammer and Rowpress without Physical Address Information
Juffinger J., Neela S., Heckel M., Schwarz L., Adamsky F., Gruß D.
Detection of Intrusions and Malware, and Vulnerability Assessment - 21st International Conference, DIMVA 2024, Proceedings, 21st Conference on Detection of Intrusions and Malware & Vulnerability Assessment, 460–479, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14828 LNCS)
Aloha-HE: A Low-Area Hardware Accelerator for Client-Side Operations in Homomorphic Encryption
Krieger F., Hirner F., Mert A., Sinha Roy S.
DATE 2024, 2024 Design, Automation and Test in Europe Conference, 1-6
OpenNTT - An Automated Toolchain for Compiling High-Performance NTT Accelerators in FHE
Krieger F., Hirner F., Mert A., Sinha Roy S.
ICCAD 2024, ACM/IEEE, 1-9
ModHE: Modular Homomorphic Encryption Using Module Lattices
Mukherjee A., Aikata A., Mert A., Lee Y., Kwon S., Deriyabin M., Sinha Roy S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(1), 527-562
REPQC: Reverse Engineering and Backdooring Hardware Accelerators for Post-quantum Cryptography
Pagliarini S., Aikata A., Imran M., Sinha Roy S.
AsiaCCS
Exploring the Advantages and Challenges of Fermat NTT in FHE Acceleration
Kim A., Mert A., Mukherjee A., Aikata A., Deryabin M., Kwon S., Kang H., Sinha Roy S.
Advances in Cryptology – CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings, 44th Annual International Cryptology Conference, 76–106, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14922 LNCS)
Secure and Efficient Outsourced Matrix Multiplication with Homomorphic Encryption
Aikata A., Sinha Roy S.
Indocrypt 2024, Indocrypt 2024
Robustness of Explainable Artificial Intelligence in Industrial Process Modelling
Kantz B., Staudinger C., Feilmayr C., Wachlmayr J., Haberl A., Schuster S., Pernkopf F.
ICML'24 Workshop ML for Life and Material Science: From Theory to Industry Applications, ICML'24 Workshop ML for Life and Material Science: From Theory to Industry Applications
Quantile: Quantifying Information Leakage
Hadzic V., Cassiers G., Primas R., Mangard S., Bloem R.
Using Knowledge Construction Theory to Evaluate Learning Processes: A Randomized Controlled Trial on Showing Gradually Built-up Concept Maps Alongside a Scientific Text
Disch L., Fessl A., Franza S., Kimmerle J., Pammer-Schindler V.
International Journal of Human-Computer Interaction
DOPE: DOmain Protection Enforcement with PKS
Maar L., Schwarzl M., Rauscher F., Gruß D., Mangard S.
Proceedings - 39th Annual Computer Security Applications Conference, ACSAC 2023, 2023 Annual Computer Security Applications Conference, 662-676, (ACM International Conference Proceeding Series)
Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency
Gigerl B., Klug F., Mangard S., Mendel F., Primas R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(1), 309-335
Quantile: Quantifying Information Leakage
Hadzic V., Cassiers G., Primas R., Mangard S., Bloem R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(1), 433-456
Learning Mealy machines with one timer
Vaandrager F., Ebrahimi M., Bloem R.
Information and Computation, Vol. 295
Trust and Privacy in a Heterogeneous World
More S.
, Doctoral Thesis
Cryptographically Enforced Memory Safety
Unterguggenberger M., Schrammel D., Lamster L., Nasahl P., Mangard S.
CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 30th ACM Conference on Computer and Communications Security, 889-903, (CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security)
Improved Search for Integral, Impossible-Differential and Zero-Correlation Attacks
Hadipour H., Gerhalter S., Sadeghi S., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2024(1)
High-speed SABER Key Encapsulation Mechanism in 65nm CMOS
Imran M., Almeida F., Basso A., Sinha Roy S., Pagliarini S.
Journal of Cryptographic Engineering, Vol. 13(4), 461-471
Collaborative Recommendation of Search Heuristics For Constraint Solvers
Garber D., Burgstaller T., Felfernig A., Le V., Lubos S., Tran T., Polat Erdeniz S.
, 38-44
CacheWarp: Software-based Fault Injection using Selective State Reset
Zhang R., Gerlach L., Weber D., Hetterich L., Lü Y., Kogler A., Schwarz M.
Proceedings of the 33nd USENIX Security Symposium, 33rd USENIX Security Symposium: USENIX Security 2024