We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Higher-Order Side-Channel Protected Implementations of KECCAK
Groß H., Schaffenrath D., Mangard S.
DSD, IEEE Computer Society, 205-212
Multi-core Data Analytics SoC with a flexible 1.76 Gbit/s AES-XTS Cryptographic Accelerator in 65 nm CMOS
Gürkaynak F., Schilling R., Mühlberghuber M., Conti F., Mangard S., Benini L.
CS2 '17, Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems , CS2 Cryptography and Security in Computing Systems, 19-24
Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives
Unterluggauer T., Werner M., Mangard S.
ACM Asia Conference on Computer and Communications Security - ASIACCS'17, 2017 ACM Asia Conference on Computer and Communications Security, 690-702
Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption
Primas R., Peßl P., Mangard S.
Cryptographic Hardware and Embedded Systems – CHES 2017, Springer, 513-533, (Lecture Notes in Computer Science; vol. 10529)
KASLR is Dead
Gruß D., Lipp M., Schwarz M., Fellner R., Maurice C., Mangard S.
Engineering Secure Software and Systems - 9th International Symposium, ESSoS 2017, Proceedings, 9th International Symposium on Engineering Secure Software and Systems, ESSoS 2017, 161-176, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10379 LNCS)
Practical Keystroke Timing Attacks in Sandboxed JavaScript
Lipp M., Gruß D., Schwarz M., Bidner D., Maurice C., Mangard S.
Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings, 22nd European Symposium on Research in Computer Security, ESORICS 2017, 191-209, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10493 LNCS)
Malware guard extension
Schwarz M., Weiser S., Gruß D., Maurice C., Mangard S.
Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, 2017, 14th International Conference on Detection of Intrusions and Malware, and Vulnerability Assess, DIMVA 2017, 3-24, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10327 LNCS)
An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order
Groß H., Mangard S., Korak T.
Topics in Cryptology – CT-RSA 2017, Topics in Cryptology - The Cryptographer's Track at the RSA Conference 2017, 95-112, (Lecture Notes in Computer Science; vol. 10159)
Fantastic timers and where to find them
Schwarz M., Maurice C., Gruß D., Mangard S.
Financial Cryptography and Data Security - 21st International Conference, FC 2017, Revised Selected Papers, 21st International Conference on Financial Cryptography and Data Security, 247-267, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10322 LNCS)
Bounded Synthesis for Streett, Rabin, and CTL*
Khalimov A., Bloem R.
CAV
A Sustainable Architecture for Secure and Usable Mobile Signature Solutions
Zefferer T.
WEBIST 2015 - Selected and Revised Papers, Springer, 343
Privacy Technologies and Policy
Schweighofer E., Leitold H., Mitrakas A., Rannenberg K.
, Springer Verlag
Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives
Chase M., Derler D., Goldfeder S., Orlandi C., Ramacher S., Rechberger C., Slamanig D., Zaverucha G.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, USA, October 30 - November 3, 2017
Cryptanalysis of Simpira v1
Eichlseder M., Dobraunig C., Mendel F.
Selected Areas in Cryptography - SAC 2016, 23rd Conference on Selected Areas in Cryptography, 284-298, (Lecture Notes in Computer Science; vol. 10532)
Side-Channel Analysis of Keymill
Dobraunig C., Eichlseder M., Korak T., Mendel F.
Constructive Side-Channel Analysis and Secure Design, 138-152, (Lecture Notes in Computer Science; vol. 10348)
Model-Based Testing IoT Communication via Active Automata Learning
Tappler M., Aichernig B., Bloem R.
2017 IEEE International Conference on Software Testing, Verification and Validation (ICST), 10th IEEE International Conference on Software Testing, Verification and Validation (ICST 2017), 276-287
Hybrid Mobile Edge Computing: Unleashing the Full Potential of Edge Computing in Mobile Device Use Cases
Reiter A., Prünster B., Zefferer T.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, IEEE Press, 935-944
SUNFISH ID1v1 – Identity Management and Access Control
Reiter A., Suzic B., Leitold H., Marsalek A., Prünster B., Ziegler D.
A new structural-differential property of 5-round AES
Grassi L., Rechberger C., Rønjom S.
Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings, Springer Verlag Wien, 289-317, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10211 LNCS)
Dependability for the Internet of Things
Boano C., Römer K., Bloem R., Witrisal K., Baunach M., Horn M.
Elektrotechnik und Informationstechnik, Vol. 133(7), 304–309