explore Our
Publications
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Grassi L., Khovratovich D., Rechberger C., Roy A., Schofnegger M.
Proceedings of the 30th USENIX Security Symposium, 30th USENIX Security Symposium, 519-535, (Proceedings of the 30th USENIX Security Symposium)
Grassi L., Rechberger C., Schofnegger M.
IACR Transactions on Symmetric Cryptology, Vol. 2021(2), 314-352
Grassi L., Leander G., Rechberger C., Tezcan C., Wiemer F.
Selected Areas in Cryptography - 27th International Conference, 2020, Revised Selected Papers, 27th International Conference on Selected Areas in Cryptography, 141-170, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12804 LNCS)
Božilov D., Eichlseder M., Knezevic M., Lambin B., Leander G., Moos T., Nikov V., Rasoolzadeh S., Todo Y., Wiemer F.
Selected Areas in Cryptography , 27th International Conference on Selected Areas in Cryptography, 483-511, (Lecture Notes in Computer Science; vol. 12804)
Schwarzl M., Schuster T., Schwarz M., Gruß D.
Schwarzl M., Kraft E., Lipp M., Gruß D.
Schwarzl M., Canella C., Gruß D., Schwarz M.
Financial Cryptography and Data Security - 25th International Conference, FC 2021, Revised Selected Papers, 25th International Conference on Financial Cryptography and Data Security, 293-310, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12674 LNCS)
Sinha Roy S., Basso A.
2021 58th ACM/IEEE Design Automation Conference (DAC), 58th Design Automation Conference, 1285-1290
Hadipour H., Bagheri N.
IACR Transactions on Symmetric Cryptology, Vol. 2021(2), 140-198
Canella C., Werner M., Gruß D., Schwarz M.
Schwarz M., Weiser S., Gruß D., Maurice C., Mangard S.
Cybersecurity, Vol. 3(1)
Abraham A., More S., Rabensteiner C., Hörandner F.
Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 1020-1027, (Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020)
Koch K., Krenn S., Pellegrino D., Ramacher S.
Alber L., More S., Ramacher S.
CCSW 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop, The ACM Cloud Computing Security Workshop in conjunction with the ACM Conference on Computer and Communications Security, 119-132, (CCSW 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop)
Könighofer B., Bloem R., Jansen N., Lorber F.
Leveraging Applications of Formal Methods, Verification and Validation, 2020 International Symposium on Leveraging Applications of Formal Methods, 290-306, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12476 LNCS)
Hadipour H., Bagheri N.
, Cryptology ePrint Archive
Lipp M., Hadzic V., Schwarz M., Perais A., Maurice C., Gruß D.
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020, 15th ACM ASIA Conference on Computer and Communications Security, 813–825
Canella C., Schwarz M., Haubenwallner M., Schwarzl M., Gruß D.
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020, 15th ACM ASIA Conference on Computer and Communications Security, 481-493, (Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020)
Maderbacher B., Karl A., Bloem R.
Runtime Verification - 20th International Conference, RV 2020, Proceedings, 20th International Conference on Runtime Verification, 241-258, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12399 LNCS)
Aichernig B., Maderbacher B.
Leveraging Applications of Formal Methods, Verification and Validation, Springer Nature Switzerland AG, 426-448, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12476 LNCS)