explore Our
Publications
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Bloem R., Chatterjee K., Jobstmann B.
Handbook of Model Checking, Springer, 921-962
Clarke E., Henzinger T., Veith H., Bloem R.
, Springer
Bloem R., Braud-Santoni N., Hadzic V., Egly U., Lonsing F., Seidl M.
fmcad.18, 18th Conference on Formal Methods in Computer-Aided Design, 40-49
Zefferer T.
Proceedings of the 14th International Conference on Web Information Systems and Technologies, 14th International Conference on Web Information Systems and Technologies, WEBIST 2018, 356-363
Dobraunig C., Eichlseder M., Grassi L., Lallemend V., Leander G., List E., Mendel F., Rechberger C.
Advances in Cryptology – CRYPTO 2018, 38th International Cryptology Conference, 662-692, (Lecture Notes in Computer Science; vol. 10991)
Wang Q., Grassi L., Rechberger C.
Topics in Cryptology - CT-RSA 2018 - The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings, 279-299
Aichernig B., Bloem R., Ebrahimi M., Tappler M., Winter J.
2018 Formal Methods in Computer Aided Design, FMCAD 2018, Austin, TX, USA, October 30 - November 2, 2018, 18th Conference on Formal Methods in Computer-Aided Design, 130 - 138
Ashur T., Eichlseder M., Lauridsen M., Leurent G., Minaud B., Rotella Y., Viguier B.
Advances in Cryptology – ASIACRYPT 2018, 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, 35-64, (Lecture Notes in Computer Science; vol. 11273)
Eichlseder M., Kales D.
IACR Transactions on Symmetric Cryptology, Vol. 2018(2), 111-132
Eichlseder M.
, Doctoral Thesis
Marsalek A., Kollmann C., Zefferer T.
ICT Systems Security and Privacy Protection, <br/>33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection , 127-140, (IFIP Advances in Information and Communication Technology; vol. 529)
Marsalek A., Prünster B., Suzic B., Zefferer T.
Information Systems Security - 14th International Conference, ICISS 2018, Proceedings, 14th International Conference on Information Systems Security, 345-363, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11281 LNCS)
Spreitzer R., Moonsamy V., Korak T., Mangard S.
IEEE Communications Surveys & Tutorials, Vol. 20(1), 465-488
Großwindhager B., Rupp A., Tappler M., Tranninger M., Weiser S., Aichernig B., Boano C., Horn M., Kubin G., Mangard S., Steinberger M., Römer K.
International Journal of Computing, Vol. 16(4), 226-237
Kales D., Eichlseder M., Mendel F.
, (IACR Cryptology ePrint Archive)
Reiter A., Suzic B., Leitold H., Marsalek A., Prünster B., Ziegler D.
Wagner G., Omolola O., More S.
Lecture Notes in Informatics, Open Identity Summit 2017
Werner M., Unterluggauer T., Mangard S.
27th International Conference on Field Programmable Logic and Applications - FPL 2017, 27th International Conference on Field Programmable Logic and Applications
Maier P., Ma Z., Bloem R.
ARES 2017 - Proceedings of the 12th International Conference on Availability, Reliability and Security, 12th International Conference on Availability, Reliability and Security, (ACM International Conference Proceeding Series; vol. Part F130521)
Gruß D., Lettner J., Schuster F., Ohrimenko O., Haller I., Costa M.
2017 Proceedings of the 26th USENIX Security Symposium