explore Our
Publications
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Grassi L., Rechberger C., Rønjom S.
FSE 2017 - 24th International Conference on Fast Software Encryption, 24th International Conference on Fast Software Encryption, 592
Bloem R., Könighofer R., Pill I., Röck F.
, 17-24
Dobraunig C., Eichlseder M., Mendel F.
Fast Software Encryption, Fast Software Encryption Workshop, (LNCS; vol. 9783)
Dobraunig C., Eichlseder M., Mendel F.
ACNS 2016, Springer, (LNCS; vol. 9696)
Dobraunig C., Eichlseder M., Korak T., Lomné V., Mendel F.
Advances in Cryptology - ASIACRYPT 2016, 2016 International Conference on the Theory and Application of Cryptology and Information Security, 369-395, (Lecture Notes in Computer Science; vol. 10031)
Aleksandrowicz G., Arbel E., Bloem R., Braak T., Devadze S., Fey G., Jenihhin M., Jutman A., Kerkoff H., Könighofer R., Malburg J., Moran S., Raik J., Rauwerda G., Riener H., Röck F., Shibin K., Sunesen K., Wan J., Zhao Y.
2016 Forum on Specification and Design Languages (FDL), FDL'16 - Forum on Specification and Design Languages
Rath C., Niedermair T., Zefferer T.
Security and Trust Management, 12th International Workshop on Security and Trust Management, STM 2016, 1-16, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9871 LNCS)
Kölbl S., Lauridsen M., Mendel F., Rechberger C.
IACR Transactions on Symmetric Cryptology, Vol. 2016(2)
Grassi L., Rechberger C., Rotaru D., Scholl P., Smart N.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 23rd ACM Conference on Computer and Communications Security, 430-443
Albrecht M., Grassi L., Rechberger C., Roy A., Tiessen T.
Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I, 2016 International Conference on the Theory and Application of Cryptology and Information Security, 191-219, (Lecture Notes in Computer Science; vol. 10031)
Dobraunig C., Eichlseder M., Kales D., Mendel F.
IACR Transactions on Symmetric Cryptology, Vol. 2016(2), 248-260
Reiter A., Suzic B., Leitold H., Cassar J., Nicoletti L., Rozenberg B., Jones C.
Reiter A., Leitold H., Suzic B., Reimair F., Moffie M., Cordina D., Pullonen P., Pettai M., Kubo B., Venturi D.
Gruß D., Bidner D., Mangard S.
Computer Security – ESORICS 2015 - 20th European Symposium on Research in Computer Security, Proceedings, 20th European Symposium on Research in Computer Security, ESORICS 2015, 108-122, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9326)
Gruß D., Spreitzer R., Mangard S.
24th USENIX Security Symposium, Washington, D.C., USA, August 12-14, 2015, 24th USENIX Security Symposium, 897-912
Dobraunig C., Koeune F., Mangard S., Mendel F., Standaert F.
CARDIS, International Conference on Smart Card Research and Advanced Applications, 225-241, (LNCS; vol. 9514)
Khalimov A., Bloem R., Veith H., Widder J., Konnov I., Rubin S., Jacobs S.
Bloem R., Hein D., Röck F., Schumi R.
International Conference on Tests And Proofs, International Conference on Tests and Proofs
Zefferer T., Teufl P.
Electronic Government and the Information Systems Perspective, 4th International Conference on Electronic Government and the Information Systems Perspective , 86-100
Bloem R., Könighofer B., Könighofer R., Wang C.
Tools and Algorithms for the Construction and Analysis of Systems (TACAS) - 21st International Conference, 21st International Conference on Tools and Algorithms for the Construction and Analysis of Systems, 533-548, (Lecture Notes in Computer Science; vol. 9035)