explore Our
Publications
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Könighofer B., Rudolf J., Palmisano A., Tappler M., Bloem R.
Innovations in Systems and Software Engineering
Grass A., Parger A.
Co-creating the Future: Inclusion in and through Design, 40th eCAADe Conference on Education and Research in Computer Aided Architectural Design in Europe, 431–440
Hadipour H., Nageler M., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2022(3), 271-302
Hadzic V., Primas R., Bloem R.
Innovations in Systems and Software Engineering, Vol. 18(3), 471-481
Nasahl P., Osorio M., Vogel P., Schaffner M., Trippel T., Rizzo D., Mangard S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022(4), 56–87
Nagpal R., Gigerl B., Primas R., Mangard S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022(4), 693–717
More S., Alber L.
Proceedings of the 17th International Conference on Availability, Reliability and Security, ARES 2022, 17th International Conference on Availability, Reliability and Security, (ACM International Conference Proceeding Series)
Giner L., Kogler A., Canella C., Schwarz M., Gruß D.
31th USENIX Security Symposium (USENIX Security 22), 31st USENIX Security Symposium
Kogler A., Juffinger J., Qazi S., Kim Y., Lipp M., Boichat N., Shiu E., Nissler M., Gruß D.
Proceedings of the 31st USENIX Security Symposium, 31st USENIX Security Symposium, 3807-3824
Bampoulidis A., Bruni A., Helminger L., Kales D., Rechberger C., Walch R.
Proceedings on Privacy Enhancing Technologies 2022, 22nd Privacy Enhancing Technologies Symposium, 768-788
More S., Heher J., Walluschek C.
Proceedings - 19th International Conference on Security and Cryptography (SECRYPT 2022), 19th International Conference on Security and Cryptography
Hadipour H., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2022(2), 92-112
Nageler M., Dobraunig C., Eichlseder M.
Advances in Cryptology – EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022, Proceedings, 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 168-191, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13277 LNCS)
Gabrielli S., Rizzi S., Mayora O., More S., Perez Baun J., Vandevelde W.
Applied Sciences, Vol. 12(7)
Egger J., Wild D., Weber M., Bedoya C., Karner F., Prutsch A., Schmied M., Dionysio C., Krobath D., Jin Y., Gsaxner C., Li J., Pepe A.
Journal of Digital Imaging, Vol. 35(2), 340-355
Erlacher J., Mendel F., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2022(1), 64-87
Dunkelman O., Eichlseder M., Kales D., Keller N., Leurent G., Schofnegger M.
Designs, Codes and Cryptography
Derya K., Mert A., Öztürk E., Savaş E.
Microprocessors and Microsystems - Embedded Hardware Design, Vol. 89
Canella C., Dorn S., Gruß D., Schwarz M.
Naseredini A., Gast S., Schwarzl M., Bernardo P., Smajic A., Canella. C., Berger M., Gruß D.
ICISSP 2022 - Proceedings of the 8th International Conference on Information Systems Security and Privacy, 8th International Conference on Information Systems Security and Privacy, 48-59