We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Ascon MAC, PRF, and Short-Input PRF
Dobraunig C., Eichlseder M., Mendel F., Schläffer M.
Topics in Cryptology – CT-RSA 2024 - Cryptographers’ Track at the RSA Conference 2024, Proceedings
Presshammer: Rowhammer and Rowpress without Physical Address Information
Juffinger J., Neela S., Heckel M., Schwarz L., Adamsky F., Gruß D.
Detection of Intrusions and Malware, and Vulnerability Assessment - 21st International Conference, DIMVA 2024, Proceedings
Aloha-HE: A Low-Area Hardware Accelerator for Client-Side Operations in Homomorphic Encryption
Krieger F., Hirner F., Mert A., Sinha Roy S.
DATE 2024
Efficient Motion Prediction: A Lightweight & Accurate Trajectory Prediction Model With Fast Training and Inference Speed
Prutsch A., Bischof H., Possegger H.
2024 IEEE/RSJ International Conference on Intelligent Robots and Systems, IROS 2024
ModHE: Modular Homomorphic Encryption Using Module Lattices
Mukherjee A., Aikata A., Mert A., Lee Y., Kwon S., Deriyabin M., Sinha Roy S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(1), 2024
Exploring the Advantages and Challenges of Fermat NTT in FHE Acceleration
Kim A., Mert A., Mukherjee A., Aikata A., Deryabin M., Kwon S., Kang H., Sinha Roy S.
Advances in Cryptology – CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings
Secure and Efficient Outsourced Matrix Multiplication with Homomorphic Encryption
Aikata A., Sinha Roy S.
Indocrypt 2024
Robustness of Explainable Artificial Intelligence in Industrial Process Modelling
Kantz B., Staudinger C., Feilmayr C., Wachlmayr J., Haberl A., Schuster S., Pernkopf F.
ICML'24 Workshop ML for Life and Material Science: From Theory to Industry Applications
Quantile: Quantifying Information Leakage
Hadzic V., Cassiers G., Primas R., Mangard S., Bloem R.
2023
Using Knowledge Construction Theory to Evaluate Learning Processes: A Randomized Controlled Trial on Showing Gradually Built-up Concept Maps Alongside a Scientific Text
Disch L., Fessl A., Franza S., Kimmerle J., Pammer-Schindler V.
International Journal of Human-Computer Interaction, 2023
DOPE: DOmain Protection Enforcement with PKS
Maar L., Schwarzl M., Rauscher F., Gruß D., Mangard S.
Proceedings - 39th Annual Computer Security Applications Conference, ACSAC 2023
Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency
Gigerl B., Klug F., Mangard S., Mendel F., Primas R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(1), 2023
Quantile: Quantifying Information Leakage
Hadzic V., Cassiers G., Primas R., Mangard S., Bloem R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(1), 2023
Learning Mealy machines with one timer
Vaandrager F., Ebrahimi M., Bloem R.
Information and Computation, Vol. 295, 2023
Trust and Privacy in a Heterogeneous World
More S.
Doctoral Thesis, 2023
Cryptographically Enforced Memory Safety
Unterguggenberger M., Schrammel D., Lamster L., Nasahl P., Mangard S.
CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security
Improved Search for Integral, Impossible-Differential and Zero-Correlation Attacks
Hadipour H., Gerhalter S., Sadeghi S., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2024(1), 2023
High-speed SABER Key Encapsulation Mechanism in 65nm CMOS
Imran M., Almeida F., Basso A., Sinha Roy S., Pagliarini S.
Journal of Cryptographic Engineering, Vol. 13(4), 2023
Collaborative Recommendation of Search Heuristics For Constraint Solvers
Garber D., Burgstaller T., Felfernig A., Le V., Lubos S., Tran T., Polat Erdeniz S.
2023
FMTESTING: A FEATUREIDE Plug-in for Automated Feature Model Analysis and Diagnosis
Burgstaller T., Le V., Tran T., Felfernig A.
ECAI 2023 - 26th European Conference on Artificial Intelligence, including 12th Conference on Prestigious Applications of Intelligent Systems, PAIS 2023 - Proceedings
