Institut für Angewandte Informationsverarbeitung und Kommunikationstechnologie (7050)

  • 8010

    Inffeldgasse 16a Graz

    Österreich

Filter
Beitrag in einem Konferenzband

Suchergebnisse

  • 2019

    ZombieLoad: Cross-Privilege-Boundary Data Sampling

    Schwarz, M., Lipp, M., Moghimi, D., Bulck, J. V., Stecklina, J., Prescher, T. & Gruss, D., 12 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM/IEEE, S. 753-768

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

  • 2020

    Accelerating Spiking Neural Networks using Memristive Crossbar Arrays

    Bohnstingl, T., Pantazi, A. & Eleftheriou, E., 23 Nov 2020, ICECS 2020 - 27th IEEE International Conference on Electronics, Circuits and Systems, Proceedings. 9294933

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

  • Algebraic Cryptanalysis of Variants of Frit

    Dobraunig, C., Eichlseder, M., Mendel, F. & Schofnegger, M., 10 Jan 2020, Selected Areas in Cryptography – SAC 2019 - 26th International Conference, Revised Selected Papers. Paterson, K. G. & Stebila, D. (Hrsg.). Springer, S. 149-170 22 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 11959 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

    Open Access
  • An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC

    Eichlseder, M., Grassi, L., Lüftenegger, R., Øygarden, M., Rechberger, C., Schofnegger, M. & Wang, Q., 1 Jan 2020, Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, 2020, Proceedings: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part . Moriai, S. & Wang, H. (Hrsg.). Cham: Springer, Band 1. S. 477-506 30 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 12491 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

    Open Access
  • An Attack on Some Signature Schemes Constructed From Five-Pass Identification Schemes

    Kales, D. & Zaverucha, G., 14 Dez 2020, Cryptology and Network Security - 19th International Conference, CANS 2020, Vienna, Austria, December 14–16, 2020, Proceedings: 19th International Conference, CANS 2020, Vienna, Austria, December 14–16, 2020, Proceedings. Krenn, S., Shulman, H. & Vaudenay, S. (Hrsg.). Springer, S. 3-22 20 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 12579 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

    Open Access
  • AndroPRINT: Analysing the Fingerprintability of the Android API

    Palfinger, G. & Prünster, B., 25 Aug 2020, Proceedings of the 15th International Conference on Availability, Reliability and Security, ARES 2020. Ireland, 10 S. (ACM International Conference Proceeding Series).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

    Datei
  • An Empirical Study of the Use of Integrity Verification Mechanisms for Web Subresources

    Chapuis, B., Omolola, O., Cherubini, M., Humbert, M. & Huguenin, K., 20 Apr 2020, The Web Conference 2020 - Proceedings of the World Wide Web Conference, WWW 2020. Association of Computing Machinery, S. 34-45 12 S. (The Web Conference 2020 - Proceedings of the World Wide Web Conference, WWW 2020).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

    Open Access
  • Big Numbers – Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations

    Weiser, S., Schrammel, D., Bodner, L. & Spreitzer, R., 1 Jan 2020, Proceedings of the 29th USENIX Security Symposium. USENIX Association, S. 1767-1784 18 S. (Proceedings of the 29th USENIX Security Symposium).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

    Open Access
  • Code between the Lines: Semantic Analysis of Android Applications

    Feichtner, J. & Gruber, S., Sep 2020, ICT Systems Security and Privacy Protection - 35th IFIP TC 11 International Conference, SEC 2020, Proceedings. Hölbl, M., Welzer, T. & Rannenberg, K. (Hrsg.). Cham: Springer International Publishing AG , Band 580. S. 171-186 16 S. (IFIP Advances in Information and Communication Technology; Band 580 IFIP).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

    Open Access
    Datei
  • Computing Expected Differential Probability of (Truncated) Differentials and Expected Linear Potential of (Multidimensional) Linear Hulls in SPN Block Ciphers

    Eichlseder, M., Leander, G. & Rasoolzadeh, S., 8 Dez 2020, Progress in Cryptology – INDOCRYPT 2020 - 21st International Conference on Cryptology in India 2020, Proceedings. Bhargavan, K., Oswald, E. & Prabhakaran, M. (Hrsg.). Springer, Cham, S. 345-369 25 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 12578 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

  • ConTExT: A Generic Approach for Mitigating Spectre

    Schwarz, M., Lipp, M., Canella, C. A., Schilling, R., Kargl, F. & Gruß, D., Feb 2020, Network and Distributed System Security Symposium 2020. 18 S.

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

    Datei
  • Donky: Domain Keys – Efficient In-Process Isolation for RISC-V and x86

    Schrammel, D., Weiser, S., Steinegger, S., Schwarzl, M., Schwarz, M., Mangard, S. & Gruß, D., Aug 2020, Proceedings of the 29th USENIX Security Symposium. USENIX Association, S. 1677-1694 18 S. (Proceedings of the 29th USENIX Security Symposium).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

    Open Access
  • Efficient Access-Control in the IIoT through Attribute-Based Encryption with Outsourced Decryption

    Ziegler, D., Marsalek, A., Prünster, B. & Sabongui, J., 2020, Proceedings of the 17th International Joint Conference on e-Business and Telecommunications: SECRYPT. SciTePress - Science and Technology Publications, Band 3. S. 547-552

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

    Open Access
    Datei
  • Efficient FPGA Implementations of LowMC and Picnic

    Kales, D., Ramacher, S., Rechberger, C., Walch, R. & Werner, M., 24 Feb 2020, Topics in Cryptology – CT-RSA 2020 - The Cryptographers Track at the RSA Conference 2020, Proceedings: The Cryptographers’ Track at the RSA Conference 2020, San Francisco, CA, USA, February 24–28, 2020, Proceedings. Jarecki, S. (Hrsg.). 12006 Aufl. San Francisco, CA, USA: Springer, Band Lecture Notes in Computer Science. S. 417-441 25 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 12006 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

    Open Access
  • Efficient Revocable Attribute-Based Encryption with Hidden Policies

    Ziegler, D. & Marsalek, A., Dez 2020, Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020. Wang, G., Ko, R., Bhuiyan, M. Z. A. & Pan, Y. (Hrsg.). S. 1638-1645 8 S. 9343127. (Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

    Open Access
    Datei
  • Evolution of Defenses against Transient-Execution Attacks

    Canella, C. A., Pudukotai Dinakarrao, S. M., Gruß, D. & Khasawneh, K. N., 7 Sep 2020, GLSVLSI 2020 - Proceedings of the 2020 Great Lakes Symposium on VLSI. ACM/IEEE, S. 169-174 6 S. (Proceedings of the ACM Great Lakes Symposium on VLSI, GLSVLSI).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

    Open Access
    Datei
  • KASLR: Break It, Fix It, Repeat

    Canella, C. A., Schwarz, M., Haubenwallner, M., Schwarzl, M. & Gruß, D., 5 Okt 2020, Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020. ACM/IEEE, S. 481-493 13 S. (Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

    Open Access
    Datei
  • LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection

    Van Bulck, J., Moghimi, D., Schwarz, M., Lipp, M., Minkin, M., Genkin, D., Yarom, Y., Sunar, B., Gruß, D. & Piessens, F., 18 Mai 2020, Proceedings - 2020 IEEE Symposium on Security and Privacy, SP 2020. Institute of Electrical and Electronics Engineers, Band 1. S. 54-72 19 S. 9152763. (Proceedings - IEEE Symposium on Security and Privacy; Band 2020-May).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

  • Medusa: Microarchitectural data leakage via automated attack synthesis

    Moghimi, D., Lipp, M., Sunar, B. & Schwarz, M., 1 Jan 2020, Proceedings of the 29th USENIX Security Symposium. USENIX Association, S. 1427-1444 18 S. (Proceedings of the 29th USENIX Security Symposium).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

    Open Access
  • Mixture Integral Attacks on Reduced-Round AES with a Known/Secret S-Box

    Grassi, L. & Schofnegger, M., 2020, Progress in Cryptology – INDOCRYPT 2020: 21st International Conference on Cryptology in India, Bangalore, India, December 13–16, 2020, Proceedings. Bhargavan, K., Oswald, E. & Prabhakaran, M. (Hrsg.). Cham: Springer, S. 312-331| 20 S. (Lecture Notes in Computer Science; Band 12578).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

  • Multiply, Divide, and Conquer - Making Fully Decentralised Access Control a Reality

    Prünster, B., Palfinger, G. & Ziegler, D., 1 Jan 2020, Network and System Security - 14th International Conference, NSS 2020, Proceedings: 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25–27, 2020, Proceedings. Kutyłowski, M., Zhang, J. & Chen, C. (Hrsg.). Springer, S. 311-326 16 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 12570 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

    Open Access
    Datei
  • Nethammer: Inducing Rowhammer Faults through Network Requests: Inducing Rowhammer Faults through Network Requests

    Lipp, M., Schwarz, M., Raab, L., Lamster, L., Aga, M. T., Maurice, C. & Gruss, D., Sep 2020, 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). Institute of Electrical and Electronics Engineers, S. 710-719 10 S. 9229701

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

  • On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy

    Grassi, L., Lüftenegger, R., Rechberger, C., Rotaru, D. & Schofnegger, M., 1 Mai 2020, Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings: Lecture Notes in Computer Science. Canteaut, A. & Ishai, Y. (Hrsg.). Springer, Cham, Band 12106. S. 674-704 31 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 12106 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

    Open Access
  • Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems

    Beyne, T., Canteaut, A., Dinur, I., Eichlseder, M., Leander, G., Leurent, G., Naya-Plasencia, M., Sasaki, Y., Todo, Y. & Wiemer, F., 1 Jan 2020, Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Ristenpart, T. (Hrsg.). Springer, S. 299-328 30 S. (Lecture Notes in Computer Science; Band 12172).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

    Open Access
  • Placement of Runtime Checks to Counteract Fault Injections

    Maderbacher, B., Karl, A. F. & Bloem, R., Okt 2020, Runtime Verification - 20th International Conference, RV 2020, Proceedings: 20th International Conference, RV 2020. Deshmukh, J. & Nickovic, D. (Hrsg.). Springer Nature Switzerland AG, S. 241-258 18 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 12399 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

    Open Access
    Datei
  • Plundervolt: Software-based fault injection attacks against intel SGX

    Murdock, K., Oswald, D., Garcia, F. D., Van Bulck, J., Gruss, D. & Piessens, F., Mai 2020, Proceedings - 2020 IEEE Symposium on Security and Privacy, SP 2020. Institute of Electrical and Electronics Engineers, S. 1466-1482 17 S. 9152636

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

  • Privacy-Preserving eID Derivation for Self-Sovereign Identity Systems

    Abraham, A., Hörandner, F., Omolola, O. & Ramacher, S., 18 Feb 2020, Information and Communications Security - 21st International Conference, ICICS 2019, Revised Selected Papers. Zhou, J., Luo, X., Shen, Q. & Xu, Z. (Hrsg.). Springer, Band 11999. S. 307-323 17 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 11999 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

  • Privacy-Preserving Service Composition with Enhanced Flexibility and Efficiency

    Theuermann, K., Hörandner, F., Abraham, A. & Ziegler, D., 14 Sep 2020, Trust, Privacy and Security in Digital Business - 17th International Conference, TrustBus 2020, Proceedings: 17th International Conference, TrustBus 2020 Bratislava, Slovakia, September 14–17, 2020 Proceedings. Gritzalis, S., Weippl, E. R., Kotsis, G., Khalil, I. & Tjoa, A. M. (Hrsg.). Springer, S. 109-124 16 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 12395 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

  • RAMBleed: Reading bits in memory without accessing them

    Kwong, A., Genkin, D., Gruss, D. & Yarom, Y., Mai 2020, Proceedings - 2020 IEEE Symposium on Security and Privacy, SP 2020. Institute of Electrical and Electronics Engineers, S. 695-711 17 S. 9152687

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

  • Reliability and Security for Safety-Critical Service Compositions

    Theuermann, K., 6 Dez 2020, Information Systems Security - 16th International Conference, ICISS 2020, Proceedings: 16th International Conference, ICISS 2020, Jammu, India, December 16–20, 2020, Proceedings. Kanhere, S., Patil, V. T., Sural, S. & Gaur, M. S. (Hrsg.). Springer, Cham, S. 45-65 21 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 12553 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

  • Revisiting Privacy-aware Blockchain Public Key Infrastructure

    Plessing, P. & Omolola, O., 1 Jan 2020, ICISSP 2020 - Proceedings of the 6th International Conference on Information Systems Security and Privacy. Furnell, S., Mori, P., Weippl, E. & Camp, O. (Hrsg.). SciTePress - Science and Technology Publications, Band 1. S. 415-423 9 S. (ICISSP 2020 - Proceedings of the 6th International Conference on Information Systems Security and Privacy).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

    Open Access
  • Revocable and Offline-Verifiable Self-Sovereign Identities

    Abraham, A., More, S., Rabensteiner, C. & Hörandner, F., Dez 2020, Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020. Wang, G., Ko, R., Bhuiyan, M. Z. A. & Pan, Y. (Hrsg.). S. 1020-1027 8 S. 9343191. (Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

  • Safe Reinforcement Learning Using Probabilistic Shields

    Jansen, N., Könighofer, B., Junges, S., Serban, A. & Bloem, R., 2020, 31st International Conference on Concurrency Theory, CONCUR 2020: 31st CONCUR 2020: Vienna, Austria (Virtual Conference). Konnov, I. & Kovacs, L. (Hrsg.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, S. 31-316 286 S. 3

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

    Open Access
  • Shield Synthesis for Reinforcement Learning

    Könighofer, B., Bloem, R., Jansen, N. & Lorber, F. L., 29 Okt 2020, Leveraging Applications of Formal Methods, Verification and Validation: Verification Principles - 9th International Symposium on Leveraging Applications of Formal Methods, ISoLA 2020, Proceedings. Margaria, T. & Steffen, B. (Hrsg.). Band 1. S. 290-306 17 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 12476 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

  • Short-Lived Forward-Secure Delegation for TLS

    Alber, L., More, S. & Ramacher, S., 9 Nov 2020, CCSW 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop. Virtual Event, USA, S. 119-132 14 S. (CCSW 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

    Open Access
  • Signatures to Go: A Framework for Qualified PDF Signing on Mobile Devices

    Ahmetovic, E., Lenz, T. & Kollmann, C., 2020, Proceedings of the 17th International Joint Conference on e-Business and Telecommunications -SECRYPT. SciTePress - Science and Technology Publications, S. 330-339 10 S.

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

    Open Access
  • Step-Wise Development of Provably Correct Actor Systems

    Aichernig, B. & Maderbacher, B., Okt 2020, Leveraging Applications of Formal Methods, Verification and Validation: Verification Principles - 9th International Symposium on Leveraging Applications of Formal Methods, ISoLA 2020, Proceedings. Margaria, T. & Steffen, B. (Hrsg.). Springer Nature Switzerland AG, S. 426-448 23 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 12476 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

    Open Access
    Datei
  • Take A Way: Exploring the Security Implications of AMD's Cache Way Predictors

    Lipp, M., Hadzic, V., Schwarz, M., Perais, A., Maurice, C. L. N. & Gruß, D., 5 Okt 2020, Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020. New York, NY: Association of Computing Machinery, S. 813–825 13 S.

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

  • The Evolution of Transient-Execution Attacks

    Canella, C. A., Khasawneh, K. N. & Gruß, D., 7 Sep 2020, GLSVLSI 2020 - Proceedings of the 2020 Great Lakes Symposium on VLSI. ACM/IEEE, S. 163-168 6 S. (Proceedings of the ACM Great Lakes Symposium on VLSI, GLSVLSI).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

    Open Access
    Datei
  • This Selfie Does Not Exist - On the Security of Electroneum Cloud Mining

    Marsalek, A., Fasllija, E. & Ziegler, D., 2020, Proceedings of the 17th International Joint Conference on e-Business and Telecommunication: SECRYPT. SciTePress - Science and Technology Publications, Band 3. S. 388-396

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

    Open Access
    Datei
  • Understanding Privacy Awareness in Android App Descriptions Using Deep Learning

    Feichtner, J. & Gruber, S., 16 Mär 2020, CODASPY 2020 - Proceedings of the 10th ACM Conference on Data and Application Security and Privacy. New York: Association of Computing Machinery, S. 203-214 12 S. (CODASPY 2020 - Proceedings of the 10th ACM Conference on Data and Application Security and Privacy).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

    Open Access
    Datei
  • 2021

    Adapting the TPL Trust Policy Language for a Self-Sovereign Identity World

    Alber, L., More, S., Mödersheim, S. & Schlichtkrull, A., 30 Mär 2021, (Angenommen/In Druck) Lecture Notes in Informatics: Open Identity Summit 2021. Bonn: Gesellschaft für Informatik , S. 107-118

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

    Open Access
    Datei
  • Adaptive Testing for Specification Coverage in CPS Models

    Bartocci, E., Bloem, R., Maderbacher, B., Manjunath, N. & Nickovic, D., 2021, 7th IFAC Conference on Analysis and Design of Hybrid Systems, ADHS 2021. (IFAC-PapersOnLine; Band 54, Nr. 5).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

    Open Access
  • A Fast and Compact RISC-V Accelerator for Ascon and Friends

    Steinegger, S. & Primas, R., 1 Jan 2021, Smart Card Research and Advanced Applications - 19th International Conference, CARDIS 2020, Revised Selected Papers: 19th International Conference, CARDIS 2020, Virtual Event, November 18–19, 2020, Revised Selected Papers. Liardet, P-Y. & Mentens, N. (Hrsg.). Cham: Springer, S. 53-67 15 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 12609 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

  • AndroTIME: Identifying Timing Side Channels in the Android API

    Palfinger, G., Prünster, B. & Ziegler, D., 2021, Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020. Wang, G., Ko, R., Bhuiyan, M. Z. A. & Pan, Y. (Hrsg.). China, S. 1849-1856 8 S. 9343137

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

  • Armored twins: Flexible privacy protection for digital twins through conditional proxy re-encryption and multi-party computation

    Hörandner, F. & Prünster, B., 2021, Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021. di Vimercati, S. D. C. & Samarati, P. (Hrsg.). SciTePress 2013, S. 149-160 12 S. (Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

    Open Access
    Datei
  • Banquet: Short and Fast Signatures from AES

    Baum, C., de Saint Guilhem, C. D., Kales, D., Orsini, E., Scholl, P. & Zaverucha, G., 5 Feb 2021, (Angenommen/In Druck) 24th International Conference on Practice and Theory of Public-Key Cryptography.

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

  • Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber

    Hamburg, M., Hermelink, J., Primas, R., Samardjiska, S., Schamberger, T., Streit, S., Strieder, E. & van Vredendaal, C., 2021, (Angenommen/In Druck) IACR Transactions on Cryptographic Hardware and Embedded Systems.

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

  • Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields

    Dobraunig, C. E., Grassi, L., Guinet, A. & Kuijsters, D., 2021, (In Vorbereitung) Lecture Notes in Computer Science. 49 S.

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

  • Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs

    Gigerl, B., Hadzic, V., Primas, R., Mangard, S. & Bloem, R., 2021, (Eingereicht) Proceedings of the 30th USENIX Security Symposium. USENIX Association, 18 S.

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

    Datei