We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Meltdown
Gruß D.
Encyclopedia of Cryptography, Security and Privacy, Third Edition, Springer, Cham, 1516-1520, 2025
Input Uncertainty Attribution by Uncertainty Propagation
Kantz B., Steger S., Staudinger C., Feilmayr C., Wachlmayr J., Haberl A., Schuster S., Pernkopf F.
ICASSP
Synthesis of Controllers for Continuous Blackbox Systems
Maderbacher B., Windisch F., Larrauri Borroto L., Bloem R.
Verification, Model Checking, and Abstract Interpretation - 26th International Conference, VMCAI 2025, Proceedings
Minimize the Randomness in Rasta-Like Designs: How Far Can We Go?
Schmid F., Rechberger C., Grassi L., Liu F., Walch R., Wang Q.
Selected Areas in Cryptography – SAC 2024 - 31st International Conference, 2024, Revised Selected Papers
SoK: Computational and Distributed Differential Privacy for MPC
Meisingseth F., Rechberger C.
Proceedings on Privacy Enhancing Technologies
Practical Two-party Computational Differential Privacy with Active Security
Meisingseth F., Rechberger C., Schmid F.
Proceedings on Privacy Enhancing Technologies
One Tree to Rule Them All
Baum C., Beullens W., Mukherjee S., Orsini E., Ramacher S., Rechberger C., Roy L., Scholl P.
Advances in Cryptology – ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
b4M: Holistic Benchmarking for MPC
Koch K., Rechberger C., Rotaru D.
Availability, Reliability and Security. ARES 2025
CounterSEVeillance: Performance-Counter Attacks on AMD SEV-SNP
Gast S., Weissteiner H., Schröder R., Gruß D.
Network and Distributed System Security (NDSS) Symposium 2025
Learning to Predict Mixed-Traffic Trajectories in Urban Scenarios from Little Training Data with Refined Environment Modeling
Prutsch A., Possegger H.
IV 2025 - 36th IEEE Intelligent Vehicles Symposium
Lanes Are Not Enough: Enhancing Trajectory Prediction in Intralogistics Through Detailed Environmental Context
Prutsch A., Wess M., Possegger H.
IROS 2025 - 2025 IEEE/RSJ International Conference on Intelligent Robots and Systems, Conference Proceedings
Leveraging Foundation Models for Labeling Custom Object Masks in LiDAR Point Cloud Sequences
Prutsch A., Schustereder M., Possegger H.
2025 European Conference on Mobile Robots, ECMR 2025 - Proceedings
REED: Chiplet-Based Scalable Hardware Accelerator for Fully Homomorphic Encryption
Aikata A., Mert A., Kwon S., Deryabin M., Sinha Roy S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2025(2), 2025
Revisiting module-lattice based homomorphic encryption and application to secure-MPC
Mukherjee A., Sinha Roy S.
IACR Communications in Crypology, Vol. 2(2), 2025
Clusters in Focus: A Simple and Robust Detail-On-Demand Dashboard for Patient Data
Schilcher L., Waldert P., Kantz B., Schreck T.
EG VCBM 2025 - Eurographics Workshop on Visual Computing for Biology and Medicine, Short Paper Proceedings
Constrained Linked Entity ANnotation using RAG (CLEANR)
Kantz B., Lengauer S., Waldert P., Schreck T.
CEUR Workshop Proceedings, Vol. 4038, 2025
Adding Retrieval Augmented Generation to the MOSAIC Framework
Holz F., Scharf D., Nussbaumer A., Gürtl S.
Proceedings of 7th International Open Search Symposium (OSSYM 2025)
ASDGen
Komar A., Rakuschek J., Meszlender D., Lackner S., Khalilsaraei S., Augsdorfer U.
Smart Tools and Applications in Graphics - Eurographics Italian Chapter Conference, STAG 2025
Towards LLM-enhanced Compiler Optimization
Garber D., Burgstaller T., Lubos S., Ratschiller P., Felfernig A.
Proceedings of the 27th International Workshop on Configuration (ConfWS 2025)
Exploring the Six Worlds of Gröbner Basis Cryptanalysis: Application to Anemoi
Koschatko K., Lüftenegger R., Rechberger C.
IACR Transactions on Symmetric Cryptology, Vol. 2024(4), 2024
