explore Our
Publications
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Gruß D., Lipp M., Schwarz M., Genkin D., Juffinger J., O'Connell S., Schoechl W., Yarom Y.
39th IEEE Symposium on Security and Privacy 2018
Unterluggauer T., Werner M., Mangard S.
Journal of Cryptographic Engineering, 1-22
Bloem R., Groß H., Iusupov R., Könighofer B., Mangard S., Winter J.
EUROCRYPT , Springer, 321-353, (Lecture Notes in Computer Science)
Spreitzer R., Palfinger G., Mangard S.
WISEC '18, Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 224-235
Weiser S., Zankl A., Spreitzer R., Miller K., Mangard S., Sigl G.
Proceedings of the 27th USENIX Security Symposium , 27th USENIX Security Symposium, 603-620
Dobraunig C., Eichlseder M., Korak T., Mangard S., Mendel F., Primas R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2018(3), 547-572
Dobraunig C., Eichlseder M., Groß H., Mangard S., Mendel F., Primas R.
Advances in Cryptology – ASIACRYPT 2018, 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, 315-342, (Lecture Notes in Computer Science; vol. 11273)
Schilling R., Werner M., Nasahl P., Mangard S.
Annual Computer Security Applications Conference, 2018 Annual Computer Security Applications Conference
Unterluggauer T., Korak T., Mangard S., Schilling R., Benini L., Gürkaynak F., Muehlberghuber M.
16th Smart Card Research and Advanced Application Conference - CARDIS 2017, International Conference on Smart Card Research and Advanced Applications
Alshiekh M., Bloem R., Ehlers R., Könighofer B., Niekum S., Topcu U.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, (AAAI-18), the 30th innovative Applications of Artificial Intelligence (IAAI-18), and the 8th AAAI Symposium on Educational Advances in Artificial Intelligence (EAAI-18), New Orleans, Louisiana, USA, February 2-7, 2018, 32nd AAAI Conference on Artificial Intelligence, 2669-2678
Spreitzer R., Kirchengast F., Gruß D., Mangard S.
ASIACCS '18 - Proceedings of the 2018 on Asia Conference on Computer and Communications Security , 749-763
Werner M., Unterluggauer T., Schaffenrath D., Mangard S.
2018 IEEE European Symposium on Security and Privacy, 2018 IEEE European Symposium on Security and Privacy
Khalimov A., Maderbacher B., Bloem R.
Automated Technology for Verification and Analysis , 16th International Symposium on Automated Technology for Verification and Analysis, 494-510, ( Lecture Notes in Computer Science; vol. 11138)
Bartocci E., Bloem R., Nickovic D., Röck F.
Computer Aided Verification , 30th International Conference on Computer Aided Verification, 547-564, (Lecture Notes in Computer Science; vol. 10980)
Bloem R., Chatterjee K., Jobstmann B.
Handbook of Model Checking, Springer, 921-962
Clarke E., Henzinger T., Veith H., Bloem R.
, Springer
Bloem R., Braud-Santoni N., Hadzic V., Egly U., Lonsing F., Seidl M.
fmcad.18, 18th Conference on Formal Methods in Computer-Aided Design, 40-49
Zefferer T.
Proceedings of the 14th International Conference on Web Information Systems and Technologies, 14th International Conference on Web Information Systems and Technologies, WEBIST 2018, 356-363
Dobraunig C., Eichlseder M., Grassi L., Lallemend V., Leander G., List E., Mendel F., Rechberger C.
Advances in Cryptology – CRYPTO 2018, 38th International Cryptology Conference, 662-692, (Lecture Notes in Computer Science; vol. 10991)
Wang Q., Grassi L., Rechberger C.
Topics in Cryptology - CT-RSA 2018 - The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings, 279-299