Publications &
Talks
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Hühnlein D., Frosch T., Schwenk J., Piswanger C., Sel M., Hühnlein T., Wich T., Nemmert D., Lottes R., Baszanowski S., Zeuner V., Rauh M., Somorovsky J., Mladenov V., Condovici C., Leitold H., Stalla-Bourdillon S., Tsakalakis N., Eichholz J., Kamm F., Urmann J., Kühne A., Wabisch D., Dean R., Shamah J., Kapanadze M., Ponte N., Martins J., Portela R., Karabat ., Stojičić S., Nedeljkovic S., Bouckaert V., Defays A., Anderson B., Jonas M., Hermanns C., Schubert T., Wegener D., Sazonov A.
Open Identity Summit 2016, Open Identity Summit 2016, 27, (Lecture Notes in Informatics; vol. P-264)
Leitold H., Schweighofer E., Mitrakas A., Rannenberg K.
Kölbl S., Lauridsen M., Mendel F., Rechberger C.
IACR Transactions on Symmetric Cryptology, Vol. 2016(2)
Grassi L., Rechberger C.
Progress in Cryptology -- INDOCRYPT 2016: 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings, 322-342
Grassi L., Rechberger C., Rotaru D., Scholl P., Smart N.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016, 430-443
Albrecht M., Grassi L., Rechberger C., Roy A., Tiessen T.
Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I, 191-219
Grassi L., Rechberger C., Rønjom S.
FSE 2017 - 24th International Conference on Fast Software Encryption, 24th International Conference on Fast Software Encryption, 592
Dobraunig C., Eichlseder M., Mendel F.
Fast Software Encryption, Fast Software Encryption Workshop, (LNCS; vol. 9783)
Dobraunig C., Eichlseder M., Mendel F.
ACNS 2016, (LNCS; vol. 9696)
Dobraunig C., Eichlseder M., Korak T., Lomné V., Mendel F.
Advances in Cryptology - ASIACRYPT 2016, 2016 International Conference on the Theory and Application of Cryptology and Information Security, 369-395, (Lecture Notes in Computer Science; vol. 10031)
Dobraunig C., Eichlseder M., Kales D., Mendel F.
IACR Transactions on Symmetric Cryptology, Vol. 2016(2)
Reiter A., Suzic B., Leitold H., Cassar J., Nicoletti L., Rozenberg B., Jones C.
Reiter A., Leitold H., Suzic B., Reimair F., Moffie M., Cordina D., Pullonen P., Pettai M., Kubo B., Venturi D.
Gruß D., Bidner D., Mangard S.
Computer Security – ESORICS 2015 - 20th European Symposium on Research in Computer Security, Proceedings, 20th European Symposium on Research in Computer Security, ESORICS 2015, 108-122, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9326)
Gruß D., Spreitzer R., Mangard S.
24th USENIX Security Symposium, Washington, D.C., USA, August 12-14, 2015, USENIX Security Symposium, 897-912
Dobraunig C., Koeune F., Mangard S., Mendel F., Standaert F.
CARDIS, International Conference on Smart Card Research and Advanced Applications, 225-241, (LNCS; vol. 9514)
Bloem R., Könighofer B., Könighofer R., Wang C.
Tools and Algorithms for the Construction and Analysis of Systems (TACAS) - 21st International Conference, International Conference on Tools and Algorithms for the Construction and Analysis of Systems, 533-548, (Lecture Notes in Computer Science