We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
One Tree to Rule Them All
Baum C., Beullens W., Mukherjee S., Orsini E., Ramacher S., Rechberger C., Roy L., Scholl P.
Advances in Cryptology – ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
b4M: Holistic Benchmarking for MPC
Koch K., Rechberger C., Rotaru D.
Availability, Reliability and Security. ARES 2025
Learning to Predict Mixed-Traffic Trajectories in Urban Scenarios from Little Training Data with Refined Environment Modeling
Prutsch A., Possegger H.
IV 2025 - 36th IEEE Intelligent Vehicles Symposium
Leveraging Foundation Models for Labeling Custom Object Masks in LiDAR Point Cloud Sequences
Prutsch A., Schustereder M., Possegger H.
2025 European Conference on Mobile Robots, ECMR 2025 - Proceedings
PASTA on Edge: Cryptoprocessor for Hybrid Homomorphic Encryption
Aikata A., Sanz Sobrino D., Sinha Roy S.
DATE: Design, Automation and Test in Europe Conference
REED: Chiplet-Based Scalable Hardware Accelerator for Fully Homomorphic Encryption
Aikata A., Mert A., Kwon S., Deryabin M., Sinha Roy S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2025(2), 2025
Revisiting module-lattice based homomorphic encryption and application to secure-MPC
Mukherjee A., Sinha Roy S.
IACR Communications in Crypology, Vol. 2(2), 2025
Clusters in Focus: A Simple and Robust Detail-On-Demand Dashboard for Patient Data
Schilcher L., Waldert P., Kantz B., Schreck T.
VCBM 2025: Eurographics Workshop on Visual Computing for Biology and Medicine
Exploring the Six Worlds of Gröbner Basis Cryptanalysis: Application to Anemoi
Koschatko K., Lüftenegger R., Rechberger C.
IACR Transactions on Symmetric Cryptology, Vol. 2024(4), 2024
Opening the Blackbox: Collision Attacks on Round-Reduced Tip5, Tip4, Tip4’ and Monolith
Liu F., Koschatko K., Grassi L., Yan H., Chen S., Banik S., Meier W.
IACR Transactions on Symmetric Cryptology, Vol. 2024(4), 2024
Efficient and Composable Masked AES S-Box Designs Using Optimized Inverters
Hadzic V., Bloem R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2025(1), 2024
Cross-Core Interrupt Detection: Exploiting User and Virtualized IPIs
Rauscher F., Gruß D.
CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security
Whipping the Multivariate-based MAYO Signature Scheme using Hardware Platforms
Hirner F., Streibl M., Krieger F., Mert A., Sinha Roy S.
CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security
Manifest Problems: Analyzing Code Transparency for Android Application Bundles
Draschbacher F., Maar L.
Annual Computer Security Applications Conference
An extensive comparison of preprocessing methods in the context of configuration space learning
Garber D., Felfernig A., Le V., Burgstaller T., El Mansi M.
Proceedings of the 26th International Workshop on Configuration (ConfWS 2024) co-located with the 30th International Conference on Principles and Practice of Constraint Programming (CP 2024)
Synthesis from Infinite-State Generalized Reactivity(1) Specifications
Maderbacher B., Windisch F., Bloem R.
Leveraging Applications of Formal Methods, Verification and Validation
On Threat Model Repair
Bloem R., Chlup S., Nickovic D., Schmittner C.
Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering Methodologies. ISoLA 2024
Active Model Learning of Git Version Control System
Muskardin E., Burgstaller T., Tappler M., Aichernig B.
Proceedings - 2024 IEEE International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2024
Monolith
Grassi L., Khovratovich D., Lüftenegger R., Rechberger C., Schofnegger M., Walch R.
IACR Transactions on Symmetric Cryptology, Vol. 2024(3), 2024
