We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Rasta: A Cipher with Low ANDdepth and Few ANDs per Bit
Dobraunig C., Eichlseder M., Grassi L., Lallemend V., Leander G., List E., Mendel F., Rechberger C.
Advances in Cryptology – CRYPTO 2018, 38th International Cryptology Conference, 662-692, (Lecture Notes in Computer Science; vol. 10991)
Zero-Sum Partitions of PHOTON Permutations
Wang Q., Grassi L., Rechberger C.
Topics in Cryptology - CT-RSA 2018 - The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings, 279-299
Cryptanalysis of MORUS
Ashur T., Eichlseder M., Lauridsen M., Leurent G., Minaud B., Rotella Y., Viguier B.
Advances in Cryptology – ASIACRYPT 2018, 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, 35-64, (Lecture Notes in Computer Science; vol. 11273)
Clustering Related-Tweak Characteristics: Application to MANTIS-6
Eichlseder M., Kales D.
IACR Transactions on Symmetric Cryptology, Vol. 2018(2), 111-132
Differential Cryptanalysis of Symmetric Primitives
Eichlseder M.
, Doctoral Thesis
Automata Learning for Symbolic Execution
Aichernig B., Bloem R., Ebrahimi M., Tappler M., Winter J.
2018 Formal Methods in Computer Aided Design, FMCAD 2018, Austin, TX, USA, October 30 - November 2, 2018, 18th Conference on Formal Methods in Computer-Aided Design, 130 - 138
A Security Analysis of FirstCoin
Marsalek A., Kollmann C., Zefferer T.
ICT Systems Security and Privacy Protection, <br/>33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection , 127-140, (IFIP Advances in Information and Communication Technology; vol. 529)
SeDiCom
Marsalek A., Prünster B., Suzic B., Zefferer T.
Information Systems Security - 14th International Conference, ICISS 2018, Proceedings, 14th International Conference on Information Systems Security, 345-363, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11281 LNCS)
Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices
Spreitzer R., Moonsamy V., Korak T., Mangard S.
IEEE Communications Surveys & Tutorials, Vol. 20(1), 465-488
Dependable Internet of Things for Networked Cars
Großwindhager B., Rupp A., Tappler M., Tranninger M., Weiser S., Aichernig B., Boano C., Horn M., Kubin G., Mangard S., Steinberger M., Römer K.
International Journal of Computing, Vol. 16(4), 226-237
Note on the Robustness of CAESAR Candidates
Kales D., Eichlseder M., Mendel F.
, (IACR Cryptology ePrint Archive)
SUNFISH ID1v2 – Identity Management and Access Control at Work
Reiter A., Suzic B., Leitold H., Marsalek A., Prünster B., Ziegler D.
Harmonizing Delegation Data Formats
Wagner G., Omolola O., More S.
Lecture Notes in Informatics, Open Identity Summit 2017
Transparent Memory Encryption and Authentication
Werner M., Unterluggauer T., Mangard S.
27th International Conference on Field Programmable Logic and Applications - FPL 2017, 27th International Conference on Field Programmable Logic and Applications
Towards a secure SCRUM process for agile web application development
Maier P., Ma Z., Bloem R.
ARES 2017 - Proceedings of the 12th International Conference on Availability, Reliability and Security, 12th International Conference on Availability, Reliability and Security, (ACM International Conference Proceeding Series; vol. Part F130521)
Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory
Gruß D., Lettner J., Schuster F., Ohrimenko O., Haller I., Costa M.
2017 Proceedings of the 26th USENIX Security Symposium
Cryptographic Service Providers in Current Device Landscapes: An Inconvenient Truth
Reimair F., Feichtner J., Ziegler D., Kreuzhuber S., Zefferer T.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications, SciTePress, 367-374
STORK: a real, heterogeneous, large-scale eID management system
Ribeiro C., Leitold H., Esposito S., Mitzman D.
International Journal of Information Security
Software-based Microarchitectural Attacks
Gruß D.
, Doctoral Thesis
An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics
Conti F., Schilling R., Schiavone P., Pullini A., Rossi D., Gürkaynak F., Mühlberghuber M., Gautschi M., Loi I., Haugou G., Mangard S., Benini L.
IEEE Transactions on Circuits and Systems