explore Our
Publications
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Juffinger J., Neela S., Gruß D.
Applied Cryptography and Network Security, 23rd International Conference on Applied Cryptography and Network Security
Maar L., Juffinger J., Steinbauer T., Gruß D., Mangard S.
Network and Distributed System Security Symposium (NDSS) 2025, Network and Distributed System Security Symposium 2025
Rauscher F., Fiedler C., Kogler A., Gruß D.
Network and Distributed System Security Symposium (NDSS) 2025, Network and Distributed System Security Symposium 2025
Juffinger J., Rauscher F., La Manna G., Gruß D.
Network and Distributed System Security (NDSS) Symposium 2025, Network and Distributed System Security Symposium 2025
Gast S., Weissteiner H., Schröder R., Gruß D.
Network and Distributed System Security (NDSS) Symposium 2025, Network and Distributed System Security Symposium 2025
Nagpal R., Cassiers G., Knoll C., Pernkopf F., Primas R., Mangard S.
Communications in Crypology
Unterguggenberger M., Lamster L., Schrammel D., Schwarzl M., Mangard S.
Network and Distributed System Security (NDSS) Symposium 2025, Network and Distributed System Security Symposium 2025
Oberhuber M., Unterguggenberger M., Maar L., Kogler A., Mangard S.
Network and Distributed System Security Symposium (NDSS) 2025, Network and Distributed System Security Symposium 2025
Kantz B., Steger S., Staudinger C., Feilmayr C., Wachlmayr J., Haberl A., Schuster S., Pernkopf F.
ICASSP
Meisingseth F., Rechberger C.
Proceedings on Privacy Enhancing Technologies, 420-439
Meisingseth F., Rechberger C., Schmid F.
Proceedings on Privacy Enhancing Technologies, 24th Privacy Enhancing Technologies Symposium, PETS 2024, 341-360
Speckbacher L., Pommerenke D., Fellner G., Pertoll L., Gossner H.
IEEE Transactions on Instrumentation and Measurement
Garber D., Felfernig A., Le V., Burgstaller T., El Mansi M.
Proceedings of the 26th International Workshop on Configuration (ConfWS 2024) co-located with the 30th International Conference on Principles and Practice of Constraint Programming (CP 2024), 26th International Workshop on Configuration, 81-90
Rauscher F., Gruß D.
ACM Conference on Computer and Communications Security (CCS) 2024, ACM Conference on Computer and Communications Security
Maderbacher B., Windisch F., Bloem R.
Leveraging Applications of Formal Methods, Verification and Validation
Muskardin E., Burgstaller T., Tappler M., Aichernig B.
Proceedings - 2024 IEEE International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2024, 2024 IEEE International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2024, 78-82, (Proceedings - 2024 IEEE International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2024)
Grass A., Hirschberg U.
Data-Driven Intelligence, 42nd eCAADe Conference on Education and research in Computer Aided Architectural Design in Europe. Data-Driven Intelligence, 639-646
Grassi L., Khovratovich D., Lüftenegger R., Rechberger C., Schofnegger M., Walch R.
IACR Transactions on Symmetric Cryptology, Vol. 2024(3), 44-83
Tollec S., Hadzic V., Nasahl P., Asavoae M., Bloem R., Couroussé D., Heydemann K., Jan M., Mangard S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(4), 179-204
Haring J., Hadzic V., Bloem R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(4), 110-132