explore Our
Publications
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Maderbacher B., Bloem R.
Proceedings of the 22nd Formal Methods in Computer-Aided Design, FMCAD 2022, 22nd Formal Methods in Computer-Aided Design, 315-324, (Conference Series: Formal Methods in Computer-Aided Design; vol. 3)
Bloem R., Hadzic V., Shukla ., Seidl M.
Proceedings - 2022 24th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, SYNASC 2022, 24th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 80-83
Bloem R., Larrauri Borroto L., Lengfeldner R., Mateis C., Nickovic D., Ziegler B.
Proceedings - 2022 International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2022, 2022 International Conference on Hardware/Software Codesign and System Synthesis, 21-24, (Proceedings - 2022 International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2022)
Prünster B., Marsalek A., Zefferer T.
31st USENIX Security Symposium, 31st USENIX Security Symposium, 3735-3752
Cid C., Grassi L., Gunsing A., Lüftenegger R., Rechberger C., Schofnegger M.
IACR Transactions on Symmetric Cryptology, Vol. 2022(1), 110-137
Grassi L., Rechberger C.
Information Security and Privacy - 27th Australasian Conference, ACISP 2022, Proceedings, 27th Australasian Conference on Information Security and Privacy, ACISP 2022, 24-45, (Lecture Notes in Computer Science; vol. 13494)
Rechberger C., Walch R.
Security and Artificial Intelligence , Springer Science and Business Media Deutschland GmbH, 109-129, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13049 LNCS)
Hadipour H., Eichlseder M.
Applied Cryptography and Network Security - 20th International Conference, ACNS 2022, Proceedings, 20th International Conference on Applied Cryptography and Network Security, 230-250, (Lecture Notes in Computer Science; vol. 13269 )
Vafaei N., Zarei S., Bagheri N., Eichlseder M., Primas R., Soleimany H.
IEEE Transactions on Information Forensics and Security, Vol. 17, 1855-1867
Easdon C., Schwarz M., Schwarzl M., Gruß D.
Proceedings of the 31st USENIX Security Symposium, Security 2022, 31st USENIX Security Symposium, 3861-3877
Lipp M., Gruß D., Schwarz M.
Proceedings of the 31st USENIX Security Symposium, Security 2022, 31st USENIX Security Symposium, 643-660
Aikata A., Mert A., Imran M., Pagliarini S., Sinha Roy S.
IEEE Transactions on Circuits and Systems I: Regular Papers, Vol. 2022, 1-12
Ravi P., Ezerman M., Bhasin S., Chattopadhyay A., Sinha Roy S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022(1), 722–761
Soleimany H., Bagheri N., Hadipour H., Ravi P., Bhasin S., Mansouri S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022(1), 367-390
Ravi P., Bhasin S., Sinha Roy S., Chattopadhyay A.
IEEE Transactions on Information Forensics and Security, Vol. 17, 684-699
Naseredini A., Gast S., Schwarzl M., Bernardo P., Smajic A., Canella C., Berger M., Gruß D.
Canella C., Werner M., Gruß D., Schwarz M.
CCSW'21 - Proceedings of the 2021 Cloud Computing Security Workshop, ACM Cloud Computing Security Workshop 2021, 139-151