We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Side-Channel Plaintext-Recovery Attacks on Leakage-Resilient Encryption
Unterluggauer T., Werner M., Mangard S.
Design, Automation & Test in Europe Conference - DATE 2017, Design, Automation & Test in Europe Conference 2017
Leveraging the adoption of electronic identities and electronic-signature solutions in Europe
Marsalek A., Zefferer T., Reimair F., Karabat Ã., Soykan E.
32nd Annual ACM Symposium on Applied Computing, SAC 2017, 32nd Annual ACM Symposium on Applied Computing, 69-71
ISAP - Towards Side-Channel Secure Authenticated Encryption
Dobraunig C., Eichlseder M., Mangard S., Mendel F., Unterluggauer T.
IACR Transactions on Symmetric Cryptology, Vol. 2017(1), 80-105
Reconciling d+1 Masking in Hardware and Software
Groß H., Mangard S.
CHES, Springer, 115-136, (Lecture Notes in Computer Science)
Higher-Order Side-Channel Protected Implementations of KECCAK
Groß H., Schaffenrath D., Mangard S.
DSD, IEEE Computer Society, 205-212
Concealing Secrets in Embedded Processors Designs
Groß H., Jelinek M., Mangard S., Unterluggauer T., Werner M.
15th Smart Card Research and Advanced Application Conference - CARDIS 2016, 15th Smart Card Research and Advanced Application Conference , 89-104, (Lecture Notes in Computer Science; vol. 10146)
Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives
Unterluggauer T., Werner M., Mangard S.
ACM Asia Conference on Computer and Communications Security - ASIACCS'17, 2017 ACM Asia Conference on Computer and Communications Security, 690-702
Multi-core Data Analytics SoC with a flexible 1.76 Gbit/s AES-XTS Cryptographic Accelerator in 65 nm CMOS
Gürkaynak F., Schilling R., Mühlberghuber M., Conti F., Mangard S., Benini L.
CS2 '17, Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems , CS2 Cryptography and Security in Computing Systems, 19-24
Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption
Primas R., Peßl P., Mangard S.
Cryptographic Hardware and Embedded Systems – CHES 2017, Springer, 513-533, (Lecture Notes in Computer Science; vol. 10529)
KASLR is Dead
Gruß D., Lipp M., Schwarz M., Fellner R., Maurice C., Mangard S.
Engineering Secure Software and Systems - 9th International Symposium, ESSoS 2017, Proceedings, 9th International Symposium on Engineering Secure Software and Systems, ESSoS 2017, 161-176, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10379 LNCS)
Practical Keystroke Timing Attacks in Sandboxed JavaScript
Lipp M., Gruß D., Schwarz M., Bidner D., Maurice C., Mangard S.
Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings, 22nd European Symposium on Research in Computer Security, ESORICS 2017, 191-209, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10493 LNCS)
Malware guard extension
Schwarz M., Weiser S., Gruß D., Maurice C., Mangard S.
Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, 2017, 14th International Conference on Detection of Intrusions and Malware, and Vulnerability Assess, DIMVA 2017, 3-24, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10327 LNCS)
An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order
Groß H., Mangard S., Korak T.
Topics in Cryptology – CT-RSA 2017, Topics in Cryptology - The Cryptographer's Track at the RSA Conference 2017, 95-112, (Lecture Notes in Computer Science; vol. 10159)
Fantastic timers and where to find them
Schwarz M., Maurice C., Gruß D., Mangard S.
Financial Cryptography and Data Security - 21st International Conference, FC 2017, Revised Selected Papers, 21st International Conference on Financial Cryptography and Data Security, 247-267, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10322 LNCS)
Bounded Synthesis for Streett, Rabin, and CTL*
Khalimov A., Bloem R.
CAV
A Sustainable Architecture for Secure and Usable Mobile Signature Solutions
Zefferer T.
WEBIST 2015 - Selected and Revised Papers, Springer, 343
Privacy Technologies and Policy
Schweighofer E., Leitold H., Mitrakas A., Rannenberg K.
, Springer Verlag
Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives
Chase M., Derler D., Goldfeder S., Orlandi C., Ramacher S., Rechberger C., Slamanig D., Zaverucha G.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, USA, October 30 - November 3, 2017
Cryptanalysis of Simpira v1
Eichlseder M., Dobraunig C., Mendel F.
Selected Areas in Cryptography - SAC 2016, 23rd Conference on Selected Areas in Cryptography, 284-298, (Lecture Notes in Computer Science; vol. 10532)
Side-Channel Analysis of Keymill
Dobraunig C., Eichlseder M., Korak T., Mendel F.
Constructive Side-Channel Analysis and Secure Design, 138-152, (Lecture Notes in Computer Science; vol. 10348)