We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
RAMBleed
Kwong A., Genkin D., Gruß D., Yarom Y.
Proceedings - 2020 IEEE Symposium on Security and Privacy, SP 2020, 41st IEEE Symposium on Security and Privacy, 695-711
Framework for faster key search using related-key higher-order differential properties
Dobraunig C., Moazami F., Rechberger C., Soleimany H.
IET Information Security, Vol. 14(2), 202-209
Efficient FPGA Implementations of LowMC and Picnic
Kales D., Ramacher S., Rechberger C., Walch R., Werner M.
Topics in Cryptology – CT-RSA 2020 - The Cryptographers Track at the RSA Conference 2020, Proceedings, Topics in Cryptology - The Cryptographer's Track at the RSA Conference 2020, 417-441, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12006 LNCS)
ConTExT: A Generic Approach for Mitigating Spectre
Schwarz M., Lipp M., Canella C., Schilling R., Kargl F., Gruß D.
Network and Distributed System Security Symposium 2020, Network and Distributed System Security Symposium 2020
Algebraic Cryptanalysis of Variants of Frit
Dobraunig C., Eichlseder M., Mendel F., Schofnegger M.
Selected Areas in Cryptography – SAC 2019 - 26th International Conference, Revised Selected Papers, 26th International Conference on Selected Areas in Cryptography, 149-170, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11959 LNCS)
Preface for the SYNT
Bloem R., Tabuada P.
Acta informatica, Vol. 57(1-2), 1
Safe Reinforcement Learning Using Probabilistic Shields
Jansen N., Könighofer B., Junges S., Serban A., Bloem R.
31st International Conference on Concurrency Theory, CONCUR 2020, 31st International Conference on Concurrency Theory, 31-316
Realtime Architecture Platform: CollabWood
Grass A., Parger A., Hirschberg U.
Projects ACADIA Proceedings 2020, ACADIA 2020, 182-187
E-Government in the Public Cloud: Requirements and Opportunities
Abraham A., Hörandner F., Zefferer T., Zwattendorfer B.
Electronic Government, Vol. 16(3), 260-280
Evaluation in Pilot-Based Research Projects: A Hierarchical Approach
Zefferer T.
Web Information Systems and Technologies - 14th International Conference, WEBIST 2018, Revised Selected Papers, 14th International Conference on Web Information Systems and Technologies, WEBIST 2018, 125-146, (Lecture Notes in Business Information Processing; vol. 372 LNBIP)
Multiply, Divide, and Conquer - Making Fully Decentralised Access Control a Reality
Prünster B., Palfinger G., Ziegler D.
Network and System Security - 14th International Conference, NSS 2020, Proceedings, 14th International Conference on Network and System Security, 311-326, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12570 LNCS)
This Selfie Does Not Exist - On the Security of Electroneum Cloud Mining
Marsalek A., Fasllija E., Ziegler D.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunication: SECRYPT, 17th International Conference on Security and Cryptography, 388-396
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC
Eichlseder M., Grassi L., Lüftenegger R., Øygarden M., Rechberger C., Schofnegger M., Wang Q.
Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, 2020, Proceedings, ASIACRYPT 2020 , 477-506, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12491 LNCS)
Protecting against Statistical Ineffective Fault Attacks
Daemen J., Dobraunig C., Eichlseder M., Groß H., Mendel F., Primas R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2020(3), 508-543
Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems
Beyne T., Canteaut A., Dinur I., Eichlseder M., Leander G., Leurent G., Naya-Plasencia M., Sasaki Y., Todo Y., Wiemer F.
Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, Proceedings, Springer, 299-328, (Lecture Notes in Computer Science; vol. 12172)
Computing Expected Differential Probability of (Truncated) Differentials and Expected Linear Potential of (Multidimensional) Linear Hulls in SPN Block Ciphers
Eichlseder M., Leander G., Rasoolzadeh S.
Progress in Cryptology – INDOCRYPT 2020 - 21st International Conference on Cryptology in India 2020, Proceedings, 21st International Conference on Cryptology in India, 345-369, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12578 LNCS)
Big Numbers – Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations
Weiser S., Schrammel D., Bodner L., Spreitzer R.
Proceedings of the 29th USENIX Security Symposium, 29th USENIX Security Symposium, 1767-1784, (Proceedings of the 29th USENIX Security Symposium)
Design and Development of a Web-based Tool for Inpainting of Dissected Aortae in Angiography Images
Prutsch A., Pepe A., Egger J.
2020 Central European Seminar on Computer Graphics, 24th Central European Seminar on Computer Graphics
Fallout: Leaking Data on Meltdown-resistant CPUs
Canella C., Genkin D., Giner L., Gruß D., Lipp M., Minkin M., Moghimi D., Piessens F., Schwarz M., Sunar B., Bulck J., Yarom Y.
CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 26th ACM Conference on Computer and Communications Security, 769-784
ZombieLoad
Schwarz M., Lipp M., Moghimi D., Bulck J., Stecklina J., Prescher T., Gruß D.
CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 26th ACM Conference on Computer and Communications Security, 753-768