We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Shields for Safe Reinforcement Learning
Könighofer B., Bloem R., Jansen N., Junges S., Pranger S.
Communications of the ACM
Synthesis of Controllers for Continuous Blackbox Systems
Maderbacher B., Windisch F., Larrauri Borroto L., Bloem R.
Verification, Model Checking, and Abstract Interpretation - 26th International Conference, VMCAI 2025, Proceedings, 26th International Conference on Verification, Model Checking, and Abstract Interpretation, VMCAI 2025, 137–159, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 15530 LNCS)
Input Uncertainty Attribution by Uncertainty Propagation
Kantz B., Steger S., Staudinger C., Feilmayr C., Wachlmayr J., Haberl A., Schuster S., Pernkopf F.
ICASSP
SoK: Computational and Distributed Differential Privacy for MPC
Meisingseth F., Rechberger C.
Proceedings on Privacy Enhancing Technologies, 25th Privacy Enhancing Technologies Symposium, PETS 2025, 420-439
Practical Two-party Computational Differential Privacy with Active Security
Meisingseth F., Rechberger C., Schmid F.
Proceedings on Privacy Enhancing Technologies, 25th Privacy Enhancing Technologies Symposium, PETS 2025, 341-360
One Tree to Rule Them All
Baum C., Beullens W., Mukherjee S., Orsini E., Ramacher S., Rechberger C., Roy L., Scholl P.
Advances in Cryptology – ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, 30th Annual International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, 463-493, (Lecture Notes in Computer Science; vol. 15484 LNCS)
Exploring Large Integer Multiplication for Cryptography Targeting In-Memory Computing
Krieger F., Hirner F., Sinha Roy S.
2025 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2025 Design, Automation and Test in Europe Conference: DATE 2025
PASTA on Edge: Cryptoprocessor for Hybrid Homomorphic Encryption
Aikata A., Sanz Sobrino D., Sinha Roy S.
DATE: Design, Automation and Test in Europe Conference, 2025 Design, Automation and Test in Europe Conference: DATE 2025
REED: Chiplet-Based Scalable Hardware Accelerator for Fully Homomorphic Encryption
Aikata A., Mert A., Kwon S., Deryabin M., Sinha Roy S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2025(2)
Exploring the Six Worlds of Gröbner Basis Cryptanalysis: Application to Anemoi
Koschatko K., Lüftenegger R., Rechberger C.
IACR Transactions on Symmetric Cryptology, Vol. 2024(4), 138-190
Opening the Blackbox: Collision Attacks on Round-Reduced Tip5, Tip4, Tip4’ and Monolith
Liu F., Koschatko K., Grassi L., Yan H., Chen S., Banik S., Meier W.
IACR Transactions on Symmetric Cryptology, Vol. 2024(4), 97-137
Efficient and Composable Masked AES S-Box Designs Using Optimized Inverters
Hadzic V., Bloem R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2025(1), 656-683
Whipping the Multivariate-based MAYO Signature Scheme using Hardware Platforms
Hirner F., Streibl M., Krieger F., Mert A., Sinha Roy S.
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, ACM Conference on Computer and Communications Security, CCS 2024, 3421-3435
Manifest Problems: Analyzing Code Transparency for Android Application Bundles
Draschbacher F., Maar L.
Annual Computer Security Applications Conference, Annual Computer Security Applications Conference
An extensive comparison of preprocessing methods in the context of configuration space learning
Garber D., Felfernig A., Le V., Burgstaller T., El Mansi M.
Proceedings of the 26th International Workshop on Configuration (ConfWS 2024) co-located with the 30th International Conference on Principles and Practice of Constraint Programming (CP 2024), 26th International Workshop on Configuration, 81-90, (CEUR Workshop Proceedings)
Cross-Core Interrupt Detection: Exploiting User and Virtualized IPIs
Rauscher F., Gruß D.
ACM Conference on Computer and Communications Security (CCS) 2024, ACM Conference on Computer and Communications Security
Synthesis from Infinite-State Generalized Reactivity(1) Specifications
Maderbacher B., Windisch F., Bloem R.
Leveraging Applications of Formal Methods, Verification and Validation
Active Model Learning of Git Version Control System
Muskardin E., Burgstaller T., Tappler M., Aichernig B.
Proceedings - 2024 IEEE International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2024, 2024 IEEE International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2024, 78-82, (Proceedings - 2024 IEEE International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2024)
Fostering Collective Creativity in Architectural Education
Grass A., Hirschberg U.
Data-Driven Intelligence, 42nd eCAADe Conference on Education and research in Computer Aided Architectural Design in Europe. Data-Driven Intelligence, 639-646