We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Clustering Related-Tweak Characteristics: Application to MANTIS-6
Eichlseder M., Kales D.
IACR Transactions on Symmetric Cryptology, Vol. 2018(2), 111-132
Differential Cryptanalysis of Symmetric Primitives
Eichlseder M.
, Doctoral Thesis
Automata Learning for Symbolic Execution
Aichernig B., Bloem R., Ebrahimi M., Tappler M., Winter J.
2018 Formal Methods in Computer Aided Design, FMCAD 2018, Austin, TX, USA, October 30 - November 2, 2018, 18th Conference on Formal Methods in Computer-Aided Design, 130 - 138
A Security Analysis of FirstCoin
Marsalek A., Kollmann C., Zefferer T.
ICT Systems Security and Privacy Protection, <br/>33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection , 127-140, (IFIP Advances in Information and Communication Technology; vol. 529)
SeDiCom
Marsalek A., Prünster B., Suzic B., Zefferer T.
Information Systems Security - 14th International Conference, ICISS 2018, Proceedings, 14th International Conference on Information Systems Security, 345-363, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11281 LNCS)
Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices
Spreitzer R., Moonsamy V., Korak T., Mangard S.
IEEE Communications Surveys & Tutorials, Vol. 20(1), 465-488
Dependable Internet of Things for Networked Cars
Großwindhager B., Rupp A., Tappler M., Tranninger M., Weiser S., Aichernig B., Boano C., Horn M., Kubin G., Mangard S., Steinberger M., Römer K.
International Journal of Computing, Vol. 16(4), 226-237
Note on the Robustness of CAESAR Candidates
Kales D., Eichlseder M., Mendel F.
, (IACR Cryptology ePrint Archive)
SUNFISH ID1v2 – Identity Management and Access Control at Work
Reiter A., Suzic B., Leitold H., Marsalek A., Prünster B., Ziegler D.
Harmonizing Delegation Data Formats
Wagner G., Omolola O., More S.
Lecture Notes in Informatics, Open Identity Summit 2017
Transparent Memory Encryption and Authentication
Werner M., Unterluggauer T., Mangard S.
27th International Conference on Field Programmable Logic and Applications - FPL 2017, 27th International Conference on Field Programmable Logic and Applications
Towards a secure SCRUM process for agile web application development
Maier P., Ma Z., Bloem R.
ARES 2017 - Proceedings of the 12th International Conference on Availability, Reliability and Security, 12th International Conference on Availability, Reliability and Security, (ACM International Conference Proceeding Series; vol. Part F130521)
Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory
Gruß D., Lettner J., Schuster F., Ohrimenko O., Haller I., Costa M.
2017 Proceedings of the 26th USENIX Security Symposium
Cryptographic Service Providers in Current Device Landscapes: An Inconvenient Truth
Reimair F., Feichtner J., Ziegler D., Kreuzhuber S., Zefferer T.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications, SciTePress, 367-374
STORK: a real, heterogeneous, large-scale eID management system
Ribeiro C., Leitold H., Esposito S., Mitzman D.
International Journal of Information Security
Software-based Microarchitectural Attacks
Gruß D.
, Doctoral Thesis
An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics
Conti F., Schilling R., Schiavone P., Pullini A., Rossi D., Gürkaynak F., Mühlberghuber M., Gautschi M., Loi I., Haugou G., Mangard S., Benini L.
IEEE Transactions on Circuits and Systems
Side-Channel Plaintext-Recovery Attacks on Leakage-Resilient Encryption
Unterluggauer T., Werner M., Mangard S.
Design, Automation & Test in Europe Conference - DATE 2017, Design, Automation & Test in Europe Conference 2017
Leveraging the adoption of electronic identities and electronic-signature solutions in Europe
Marsalek A., Zefferer T., Reimair F., Karabat Ã., Soykan E.
32nd Annual ACM Symposium on Applied Computing, SAC 2017, 32nd Annual ACM Symposium on Applied Computing, 69-71
ISAP - Towards Side-Channel Secure Authenticated Encryption
Dobraunig C., Eichlseder M., Mangard S., Mendel F., Unterluggauer T.
IACR Transactions on Symmetric Cryptology, Vol. 2017(1), 80-105