We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Politics in Games - An Overview and Classification
Gutwenger L., Keller S., Dolezal M., Schnogl B., Rous S., Poier K., Pirker J.
2024 IEEE Gaming, Entertainment, and Media Conference, GEM 2024
Fostering AI Literacy: An Investigation of Learning Resources for Secondary School Students
Keller S., Steinbauer-Wagner G.
2024
Towards Private Deep Learning-Based Side-Channel Analysis Using Homomorphic Encryption
Schmid F., Mukherjee S., Picek S., Stöttinger M., De Santis F., Rechberger C.
Constructive Side-Channel Analysis and Secure Design - 15th International Workshop, COSADE 2024, Proceedings
Hiding Your Awful Online Choices Made More Efficient and Secure
Mukherjee S., Walch R., Meisingseth F., Lex E., Rechberger C.
ICT Systems Security and Privacy Protection - 39th IFIP International Conference, SEC 2024, Proceedings
Authenticated Encryption Schemes
Eichlseder M.
Symmetric Cryptography, Volume 1: Design and Security Proofs, ISTE; Wiley, 87-97, 2024
Ascon MAC, PRF, and Short-Input PRF
Dobraunig C., Eichlseder M., Mendel F., Schläffer M.
Topics in Cryptology – CT-RSA 2024 - Cryptographers’ Track at the RSA Conference 2024, Proceedings
Presshammer: Rowhammer and Rowpress without Physical Address Information
Juffinger J., Neela S., Heckel M., Schwarz L., Adamsky F., Gruß D.
Detection of Intrusions and Malware, and Vulnerability Assessment - 21st International Conference, DIMVA 2024, Proceedings
Aloha-HE: A Low-Area Hardware Accelerator for Client-Side Operations in Homomorphic Encryption
Krieger F., Hirner F., Mert A., Sinha Roy S.
DATE 2024
Efficient Motion Prediction: A Lightweight & Accurate Trajectory Prediction Model With Fast Training and Inference Speed
Prutsch A., Bischof H., Possegger H.
2024 IEEE/RSJ International Conference on Intelligent Robots and Systems, IROS 2024
ModHE: Modular Homomorphic Encryption Using Module Lattices
Mukherjee A., Aikata A., Mert A., Lee Y., Kwon S., Deriyabin M., Sinha Roy S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(1), 2024
Exploring the Advantages and Challenges of Fermat NTT in FHE Acceleration
Kim A., Mert A., Mukherjee A., Aikata A., Deryabin M., Kwon S., Kang H., Sinha Roy S.
Advances in Cryptology – CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings
Secure and Efficient Outsourced Matrix Multiplication with Homomorphic Encryption
Aikata A., Sinha Roy S.
Indocrypt 2024
Robustness of Explainable Artificial Intelligence in Industrial Process Modelling
Kantz B., Staudinger C., Feilmayr C., Wachlmayr J., Haberl A., Schuster S., Pernkopf F.
ICML'24 Workshop ML for Life and Material Science: From Theory to Industry Applications
Quantile: Quantifying Information Leakage
Hadzic V., Cassiers G., Primas R., Mangard S., Bloem R.
2023
Using Knowledge Construction Theory to Evaluate Learning Processes: A Randomized Controlled Trial on Showing Gradually Built-up Concept Maps Alongside a Scientific Text
Disch L., Fessl A., Franza S., Kimmerle J., Pammer-Schindler V.
International Journal of Human-Computer Interaction, 2023
DOPE: DOmain Protection Enforcement with PKS
Maar L., Schwarzl M., Rauscher F., Gruß D., Mangard S.
Proceedings - 39th Annual Computer Security Applications Conference, ACSAC 2023
Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency
Gigerl B., Klug F., Mangard S., Mendel F., Primas R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(1), 2023
Quantile: Quantifying Information Leakage
Hadzic V., Cassiers G., Primas R., Mangard S., Bloem R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(1), 2023
Learning Mealy machines with one timer
Vaandrager F., Ebrahimi M., Bloem R.
Information and Computation, Vol. 295, 2023
Trust and Privacy in a Heterogeneous World
More S.
Doctoral Thesis, 2023
