We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Skyscraper: Fast Hashing on Big Primes
Schmid F., Rechberger C., Koschatko K., Grassi L., Bouvier C., Khovratovich D., Schofnegger M.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2025(2), 743-780
SoK: Computational and Distributed Differential Privacy for MPC
Meisingseth F., Rechberger C.
Proceedings on Privacy Enhancing Technologies, 25th Privacy Enhancing Technologies Symposium, PETS 2025, 420-439
Practical Two-party Computational Differential Privacy with Active Security
Meisingseth F., Rechberger C., Schmid F.
Proceedings on Privacy Enhancing Technologies, 25th Privacy Enhancing Technologies Symposium, PETS 2025, 341-360
One Tree to Rule Them All
Baum C., Beullens W., Mukherjee S., Orsini E., Ramacher S., Rechberger C., Roy L., Scholl P.
Advances in Cryptology – ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, 30th Annual International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, 463-493, (Lecture Notes in Computer Science; vol. 15484 LNCS)
Exploring the Six Worlds of Gröbner Basis Cryptanalysis: Application to Anemoi
Koschatko K., Lüftenegger R., Rechberger C.
IACR Transactions on Symmetric Cryptology, Vol. 2024(4), 138-190
Monolith
Grassi L., Khovratovich D., Lüftenegger R., Rechberger C., Schofnegger M., Walch R.
IACR Transactions on Symmetric Cryptology, Vol. 2024(3), 44-83
Minimize the Randomness in Rasta-Like Designs: How Far Can We Go?
Schmid F., Rechberger C., Grassi L., Liu F., Walch R., Wang Q.
Selected Areas in Cryptography, Springer
OPRFs from Isogenies
Heimberger L., Hennerbichler T., Meisingseth F., Ramacher S., Rechberger C.
ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 19th ACM ASIA Conference on Computer and Communications Security, 575-588
Towards Private Deep Learning-Based Side-Channel Analysis using Homomorphic Encryption
Schmid F., Rechberger C., Mukherjee S., Stöttinger M., Picek S., De Santis F.
Constructive Side-Channel Analysis and Secure Design , 15th International Workshop on Constructive Side-Channel Analysis and Secure Design
Towards Private Deep Learning-Based Side-Channel Analysis Using Homomorphic Encryption
Schmid F., Mukherjee S., Picek S., Stöttinger M., De Santis F., Rechberger C.
Constructive Side-Channel Analysis and Secure Design - 15th International Workshop, COSADE 2024, Proceedings, 15th International Workshop on Constructive Side-Channel Analysis and Secure Design, 133-154, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14595 LNCS)
Hiding Your Awful Online Choices Made More Efficient and Secure
Mukherjee S., Walch R., Meisingseth F., Lex E., Rechberger C.
ICT Systems Security and Privacy Protection - 39th IFIP International Conference, SEC 2024, Proceedings, 39th IFIP International Conference on ICT Systems Security and Privacy Protection, 353-366, (IFIP Advances in Information and Communication Technology; vol. 710)
Pasta: A Case for Hybrid Homomorphic Encryption
Dobraunig C., Grassi L., Helminger L., Rechberger C., Schofnegger M., Walch R.
TCHES 2023 Volume 2023/3, 25th Conference on Cryptographic Hardware and Embedded Systems
Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications
Grassi L., Hao Y., Rechberger C., Schofnegger M., Walch R., Wang Q.
Crypto 2023, 43rd International Cryptology Conference
Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto
Dobraunig C., Kales D., Rechberger C., Schofnegger M., Zaverucha G.
CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 29th ACM Conference on Computer and Communications Security, 843–857, (Proceedings of the ACM Conference on Computer and Communications Security)
Reinforced Concrete: A Fast Hash Function for Verifiable Computation
Lüftenegger R., Rechberger C., Grassi L., Schofnegger M., Walch R., Khovratovich D.
CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022 ACM SIGSAC Conference on Computer and Communications Security, 1323–1335, (Proceedings of the ACM Conference on Computer and Communications Security)
Privately Connecting Mobility to Infectious Diseases via Applied Cryptography
Bampoulidis A., Bruni A., Helminger L., Kales D., Rechberger C., Walch R.
Proceedings on Privacy Enhancing Technologies 2022, 22nd Privacy Enhancing Technologies Symposium, 768-788
Multi-Party Computation in the GDPR
Helminger L., Rechberger C.
Privacy Symposium 2022 - Data Protection Law International Convergence and Compliance with Innovative Technologies (DPLICIT), Springer, Cham, 21–39
Influence of the Linear Layer on the Algebraic Degree in SP-Networks
Cid C., Grassi L., Gunsing A., Lüftenegger R., Rechberger C., Schofnegger M.
IACR Transactions on Symmetric Cryptology, Vol. 2022(1), 110-137
Truncated Differential Properties of the Diagonal Set of Inputs for 5-Round AES
Grassi L., Rechberger C.
Information Security and Privacy - 27th Australasian Conference, ACISP 2022, Proceedings, 27th Australasian Conference on Information Security and Privacy, ACISP 2022, 24-45, (Lecture Notes in Computer Science; vol. 13494)