We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
White-Box Traceable Attribute-Based Encryption with Hidden Policies and Outsourced Decryption
Ziegler D., Marsalek A., Palfinger G.
Proceedings - 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
SSI Strong Authentication using a Mobile-Phone based Identity Wallet reaching a High Level of Assurance
Abraham A., Schinnerl C., More S.
Proceedings of the 8th International Conference on Security and Cryptography (SECRYPT 2021), 18th International Conference on Security and Cryptography, 137-148
Privacy-Preserving eID Derivation to Self-Sovereign Identity Systems with Offline Revocation
Abraham A., Koch K., More S., Ramacher S., Stopar M.
Proceedings - 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 506-513, (Proceedings - 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021)
Ascon v1.2: Lightweight Authenticated Encryption and Hashing
Dobraunig C., Eichlseder M., Mendel F., Schläffer M.
Journal of Cryptology, Vol. 34(3)
Learning Mealy Machines with One Timer
Vaandrager F., Bloem R., Ebrahimi M.
Language and Automata Theory and Applications - 15th International Conference, LATA 2021, Proceedings, 14th-15th International Conference on Language and Automata Theory and Applications, 157-170, (Lecture Notes in Computer Science; vol. 12638)
Proving SIFA Protection of Masked Redundant Circuits
Hadzic V., Primas R., Bloem R.
Automated Technology for Verification and Analysis, 19th International Symposium on Automated Technology for Verification and Analysis , 249-265, (Lecture Notes in Computer Science; vol. 12971)
AndroTIME: Identifying Timing Side Channels in the Android API
Palfinger G., Prünster B., Ziegler D.
Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 1849-1856
Poseidon: A New Hash Function for Zero-Knowledge Proof Systems
Grassi L., Khovratovich D., Rechberger C., Roy A., Schofnegger M.
Proceedings of the 30th USENIX Security Symposium, 30th USENIX Security Symposium, 519-535, (Proceedings of the 30th USENIX Security Symposium)
Proving Resistance Against Infinitely Long Subspace Trails: How to Choose the Linear Layer
Grassi L., Rechberger C., Schofnegger M.
IACR Transactions on Symmetric Cryptology, Vol. 2021(2), 314-352
Weak-Key Distinguishers for AES
Grassi L., Leander G., Rechberger C., Tezcan C., Wiemer F.
Selected Areas in Cryptography - 27th International Conference, 2020, Revised Selected Papers, 27th International Conference on Selected Areas in Cryptography, 141-170, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12804 LNCS)
PRINCEv2 - More Security for (Almost) No Overhead
Božilov D., Eichlseder M., Knezevic M., Lambin B., Leander G., Moos T., Nikov V., Rasoolzadeh S., Todo Y., Wiemer F.
Selected Areas in Cryptography , 27th International Conference on Selected Areas in Cryptography, 483-511, (Lecture Notes in Computer Science; vol. 12804)
Speculative Dereferencing: Reviving Foreshadow
Schwarzl M., Schuster T., Schwarz M., Gruß D.
Remote Memory-Deduplication Attacks
Schwarzl M., Kraft E., Lipp M., Gruß D.
Specfuscator: Evaluating Branch Removal as a Spectre Mitigation
Schwarzl M., Canella C., Gruß D., Schwarz M.
Financial Cryptography and Data Security - 25th International Conference, FC 2021, Revised Selected Papers, 25th International Conference on Financial Cryptography and Data Security, 293-310, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12674 LNCS)
Optimized Polynomial Multiplier Architectures for Post-Quantum KEM Saber
Sinha Roy S., Basso A.
2021 58th ACM/IEEE Design Automation Conference (DAC), 58th Design Automation Conference, 1285-1290
Automating Seccomp Filter Generation for Linux Applications
Canella C., Werner M., Gruß D., Schwarz M.
Malware Guard Extension: abusing Intel SGX to conceal cache attacks
Schwarz M., Weiser S., Gruß D., Maurice C., Mangard S.
Cybersecurity, Vol. 3(1)
Revocable and Offline-Verifiable Self-Sovereign Identities
Abraham A., More S., Rabensteiner C., Hörandner F.
Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 1020-1027, (Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020)
Privacy-preserving Analytics for Data Markets using MPC
Koch K., Krenn S., Pellegrino D., Ramacher S.
Short-Lived Forward-Secure Delegation for TLS
Alber L., More S., Ramacher S.
CCSW 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop, The ACM Cloud Computing Security Workshop in conjunction with the ACM Conference on Computer and Communications Security, 119-132, (CCSW 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop)