We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Efficient Motion Prediction: A Lightweight & Accurate Trajectory Prediction Model With Fast Training and Inference Speed
Prutsch A., Bischof H., Possegger H.
IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), 2024 IEEE/RSJ International Conference on Intelligent Robots and Systems, IROS 2024
Politics in Games - An Overview and Classification
Gutwenger L., Keller S., Dolezal M., Schnogl B., Rous S., Poier K., Pirker J.
2024 IEEE Gaming, Entertainment, and Media Conference, GEM 2024, 2024 IEEE Gaming, Entertainment, and Media Conference
Fostering AI Literacy: An Investigation of Learning Resources for Secondary School Students
Keller S., Steinbauer-Wagner G.
Towards Private Deep Learning-Based Side-Channel Analysis Using Homomorphic Encryption
Schmid F., Mukherjee S., Picek S., Stöttinger M., De Santis F., Rechberger C.
Constructive Side-Channel Analysis and Secure Design - 15th International Workshop, COSADE 2024, Proceedings, 15th International Workshop on Constructive Side-Channel Analysis and Secure Design, 133-154, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14595 LNCS)
Hiding Your Awful Online Choices Made More Efficient and Secure
Mukherjee S., Walch R., Meisingseth F., Lex E., Rechberger C.
ICT Systems Security and Privacy Protection - 39th IFIP International Conference, SEC 2024, Proceedings, 39th IFIP International Conference on ICT Systems Security and Privacy Protection, 353-366, (IFIP Advances in Information and Communication Technology; vol. 710)
Authenticated Encryption Schemes
Eichlseder M.
Symmetric Cryptography, Volume 1: Design and Security Proofs, ISTE; Wiley, 87-97
Ascon MAC, PRF, and Short-Input PRF
Dobraunig C., Eichlseder M., Mendel F., Schläffer M.
Topics in Cryptology – CT-RSA 2024 - Cryptographers’ Track at the RSA Conference 2024, Proceedings, Springer, 381-403, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14643 LNCS)
Presshammer: Rowhammer and Rowpress without Physical Address Information
Juffinger J., Neela S., Heckel M., Schwarz L., Adamsky F., Gruß D.
Detection of Intrusions and Malware, and Vulnerability Assessment - 21st International Conference, DIMVA 2024, Proceedings, 21st Conference on Detection of Intrusions and Malware & Vulnerability Assessment, 460–479, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14828 LNCS)
Aloha-HE: A Low-Area Hardware Accelerator for Client-Side Operations in Homomorphic Encryption
Krieger F., Hirner F., Mert A., Sinha Roy S.
2024 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2024 Design, Automation and Test in Europe Conference
OpenNTT - An Automated Toolchain for Compiling High-Performance NTT Accelerators in FHE
Krieger F., Hirner F., Mert A., Sinha Roy S.
2024 ACM/IEEE International Conference on Computer-Aided Design, ACM/IEEE
ModHE: Modular Homomorphic Encryption Using Module Lattices
Mukherjee A., Aikata A., Mert A., Lee Y., Kwon S., Deriyabin M., Sinha Roy S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(1), 527-562
REPQC: Reverse Engineering and Backdooring Hardware Accelerators for Post-quantum Cryptography
Pagliarini S., Aikata A., Imran M., Sinha Roy S.
AsiaCCS
Exploring the Advantages and Challenges of Fermat NTT in FHE Acceleration
Kim A., Mert A., Mukherjee A., Aikata A., Deryabin M., Kwon S., Kang H., Sinha Roy S.
Advances in Cryptology – CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings, 44th Annual International Cryptology Conference, 76–106, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14922 LNCS)
Secure and Efficient Outsourced Matrix Multiplication with Homomorphic Encryption
Aikata A., Sinha Roy S.
Indocrypt 2024, Indocrypt 2024
Robustness of Explainable Artificial Intelligence in Industrial Process Modelling
Kantz B., Staudinger C., Feilmayr C., Wachlmayr J., Haberl A., Schuster S., Pernkopf F.
ICML'24 Workshop ML for Life and Material Science: From Theory to Industry Applications, ICML'24 Workshop ML for Life and Material Science: From Theory to Industry Applications
Quantile: Quantifying Information Leakage
Hadzic V., Cassiers G., Primas R., Mangard S., Bloem R.
DOPE: DOmain Protection Enforcement with PKS
Maar L., Schwarzl M., Rauscher F., Gruß D., Mangard S.
Proceedings - 39th Annual Computer Security Applications Conference, ACSAC 2023, 2023 Annual Computer Security Applications Conference, 662-676, (ACM International Conference Proceeding Series)
Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency
Gigerl B., Klug F., Mangard S., Mendel F., Primas R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(1), 309-335
Quantile: Quantifying Information Leakage
Hadzic V., Cassiers G., Primas R., Mangard S., Bloem R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(1), 433-456
Learning Mealy machines with one timer
Vaandrager F., Ebrahimi M., Bloem R.
Information and Computation, Vol. 295