We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Flush+Flush
Gruß D., Maurice C., Wagner K., Mangard S.
Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, Proceedings, 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, 279-299, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9721)
ARMageddon: Last-Level Cache Attacks on Mobile Devices
Lipp M., Gruß D., Spreitzer R., Maurice C., Mangard S.
25th USENIX Security Symposium (USENIX Security 16), USENIX Association, 549-564
Learning Models of a Network Protocol using Neural Network Language Models
Aichernig B., Bloem R., Pernkopf F., Röck F., Schrank T., Tappler M.
IEEE Symposium on Security and Privacy, SP 2016, San Jose, CA, USA, May 22-26, 2016
Towards Privacy-preserving Attribute Aggregation in Federated eID Systems
Priesnitz Filho W., Ribeiro C., Zefferer T.
CAiSE Forum 2016, CEUR-WS.org, 97-104, (CEUR Workshop Proceedings; vol. 1612)
An Ontology-based Interoperability Solution for Electronic-Identity Systems
Priesnitz Filho W., Ribeiro C., Zefferer T.
IEEE International Conference on Services Computing (SCC 2016), 2016 IEEE International Conference on Services Computing (SCC), 17-24
FutureTrust - Future Trust Services for Trustworthy Global Transactions
Hühnlein D., Frosch T., Schwenk J., Piswanger C., Sel M., Hühnlein T., Wich T., Nemmert D., Lottes R., Baszanowski S., Zeuner V., Rauh M., Somorovsky J., Mladenov V., Condovici C., Leitold H., Stalla-Bourdillon S., Tsakalakis N., Eichholz J., Kamm F., Urmann J., Kühne A., Wabisch D., Dean R., Shamah J., Kapanadze M., Ponte N., Martins J., Portela R., Karabat ., Stojičić S., Nedeljkovic S., Bouckaert V., Defays A., Anderson B., Jonas M., Hermanns C., Schubert T., Wegener D., Sazonov A.
Open Identity Summit 2016, Open Identity Summit 2016, 27, (Lecture Notes in Informatics; vol. P-264)
GDPR & ePrivacy
Leitold H., Schweighofer E., Mitrakas A., Rannenberg K.
, Österreichische Computergesellschaft
Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE
Grassi L., Rechberger C.
Progress in Cryptology -- INDOCRYPT 2016: 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings, Springer International Publishing AG , 322-342
Subspace Trail Cryptanalysis and its Applications to AES
Grassi L., Rechberger C., Rønjom S.
FSE 2017 - 24th International Conference on Fast Software Encryption, 24th International Conference on Fast Software Encryption, FSE 2017, 592
Analysis of the Kupyna-256 Hash Function
Dobraunig C., Eichlseder M., Mendel F.
Fast Software Encryption, Fast Software Encryption Workshop, (LNCS; vol. 9783)
Square Attack on 7-Round Kiasu-BC
Dobraunig C., Eichlseder M., Mendel F.
ACNS 2016, Springer, (LNCS; vol. 9696)
Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes
Dobraunig C., Eichlseder M., Korak T., Lomné V., Mendel F.
Advances in Cryptology - ASIACRYPT 2016, 2016 International Conference on the Theory and Application of Cryptology and Information Security, 369-395, (Lecture Notes in Computer Science; vol. 10031)
Synthesizing Adaptive Test Strategies from Temporal Logic Specifications
Bloem R., Könighofer R., Pill I., Röck F.
, 17-24
Designing Reliable Cyber-Physical Systems
Aleksandrowicz G., Arbel E., Bloem R., Braak T., Devadze S., Fey G., Jenihhin M., Jutman A., Kerkoff H., Könighofer R., Malburg J., Moran S., Raik J., Rauwerda G., Riener H., Röck F., Shibin K., Sunesen K., Wan J., Zhao Y.
2016 Forum on Specification and Design Languages (FDL), FDL'16 - Forum on Specification and Design Languages
Towards a Personal Security Device
Rath C., Niedermair T., Zefferer T.
Security and Trust Management, 12th International Workshop on Security and Trust Management, STM 2016, 1-16, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9871 LNCS)
Haraka v2 - Efficient Short-Input Hashing for Post-Quantum Applications
Kölbl S., Lauridsen M., Mendel F., Rechberger C.
IACR Transactions on Symmetric Cryptology, Vol. 2016(2)
MPC-Friendly Symmetric Key Primitives
Grassi L., Rechberger C., Rotaru D., Scholl P., Smart N.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 23rd ACM Conference on Computer and Communications Security, 430-443
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity
Albrecht M., Grassi L., Rechberger C., Roy A., Tiessen T.
Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I, 2016 International Conference on the Theory and Application of Cryptology and Information Security, 191-219, (Lecture Notes in Computer Science; vol. 10031)
Practical Key Recovery Attack on MANTIS-5
Dobraunig C., Eichlseder M., Kales D., Mendel F.
IACR Transactions on Symmetric Cryptology, Vol. 2016(2), 248-260