Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output 1983 2018

2018

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange

Derler, D., Jager, T., Slamanig, D. & Striecks, C. 2018 (Accepted/In press) Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018.

Research output: Research - peer-reviewConference contribution

Highly-Efficient Fully-Anonymous Dynamic Group Signatures

Derler, D. & Slamanig, D. 2018 (Accepted/In press) Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security, AsiaCCS 2018, Songdo, Incheon, Korea, June 4-8, 2018.

Research output: Research - peer-reviewConference contribution

JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks

Schwarz, M., Lipp, M. & Gruß, D. 18 Feb 2018 p. 15

Research output: Research - peer-reviewPaper

Websites
Web browsers
World Wide Web
Interfaces (computer)
Hardware

KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks

Schwarz, M., Lipp, M., Gruß, D., Weiser, S., Maurice, C. L. N., Spreitzer, R. & Mangard, S. 18 Feb 2018 p. 15

Research output: Research - peer-reviewPaper

Smartphones
Websites
Side channel attack
Processing
Android (operating system)

Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key Primitives

Derler, D., Ramacher, S. & Slamanig, D. 2018 (Accepted/In press) Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Fort Lauderdale, Florida, April 9-11, 2018.

Research output: Research - peer-reviewConference contribution

Practical Witness Encryption for Algebraic Languages Or How to Encrypt Under Groth-Sahai Proofs

Derler, D. & Slamanig, D. 2018 (Accepted/In press) In : Designs, codes and cryptography. 23 p.

Research output: Research - peer-reviewArticle

ProcHarvester: Fully Automated Analysis of Procfs Side-Channel Leaks on Android

Spreitzer, R., Kirchengast, F., Gruß, D. & Mangard, S. 2018 (Accepted/In press) 13th ACM ASIA Conference on Information, Computer and Communications Security.

Research output: Research - peer-reviewConference contribution

Open Access
File

Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications

Derler, D., Krenn, S., Lorünser, T., Ramacher, S., Slamanig, D. & Striecks, C. 2018 (Accepted/In press) Public-Key Cryptography - PKC 2018, Rio De Janeiro, Brazil, March 25-28, 2018.

Research output: Research - peer-reviewConference contribution

Robust Deformation Estimation in Wood-Composite Materials using Variational Optical Flow

Hofinger, M., Pock, T. & Moosbrugger, T. 5 Feb 2018 p. 97 - 104 8 p.

Research output: Research - peer-reviewPaper

Open Access
Optical flows
Optical Flow
Humidity
Composite Materials
Atmospheric humidity

Short Double- and N-Times-Authentication-Preventing Signatures from ECDSA and More

Derler, D., Ramacher, S. & Slamanig, D. 2018 (Accepted/In press) 2018 IEEE European Symposium on Security and Privacy, EuroS&P 2018, London, United Kingdom, April 26-28, 2018.

Research output: Research - peer-reviewConference contribution

Single Trace Attack Against RSA Key Generation in Intel SGX SSL

Weiser, S., Spreitzer, R. & Bodner, L. 2018 (Accepted/In press)

Research output: Research - peer-reviewPaper

Open Access
File
2017

An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order

Groß, H., Mangard, S. & Korak, T. 10 Jan 2017

Research output: Research - peer-reviewPaper

File
Cryptography
Networks (circuits)
Digital circuits
Computer hardware
Costs

An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order

Groß, H., Mangard, S. & Korak, T. 2017 CT-RSA. Springer, Vol. 10159, p. 95-112 18 p. (Lecture Notes in Computer Science)

Research output: Research - peer-reviewConference contribution

A new structural-differential property of 5-round AES

Grassi, L., Rechberger, C. & Rønjom, S. 2017 Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag Wien, Vol. 10211 LNCS, p. 289-317 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10211 LNCS)

Research output: Research - peer-reviewConference contribution

Structural properties
Data storage equipment
Costs
Random Permutation
Block Cipher

An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics

Conti, F., Schilling, R., Schiavone, P. D., Pullini, A., Rossi, D., Gürkaynak, F. K., Mühlberghuber, M., Gautschi, M., Loi, I., Haugou, G., Mangard, S. & Benini, L. 17 May 2017 IEEE Transactions on Circuits and Systems.

Research output: Research - peer-reviewConference contribution

Ascon hardware implementations and side-channel evaluation

Groß, H., Wenger, E., Dobraunig, C. & Ehrenhöfer, C. 2017 In : Microprocessors and microsystems - Embedded Hardware Design. 52, p. 470-479 10 p.

Research output: Research - peer-reviewArticle

Hardware
Ethernet
Radio frequency identification (RFID)
Sensor nodes
Embedded systems

A Sustainable Architecture for Secure and Usable Mobile Signature Solutions

Zefferer, T. 2017 WEBIST 2015 - Selected and Revised Papers. 1 ed. Springer, p. 343 364 p.

Research output: Research - peer-reviewChapter

Bounded Synthesis for Streett, Rabin, and CTL*

Khalimov, A. & Bloem, R. 2017 CAV.

Research output: Research - peer-reviewConference contribution

File

Chameleon-Hashes with Ephemeral Trapdoors and Applications to Invisible Sanitizable Signatures

Camenisch, J., Derler, D., Krenn, S., Pöhls, H., Samelin, K. & Slamanig, D. 2017 Public-Key Cryptography - PKC 2017 . Springer Verlag, p. 152-182 (Lecture Notes in Computer Science; vol. 10175)

Research output: Research - peer-reviewConference contribution

Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160

Liu, F., Mendel, F. & Wang, G. 2017 Advances in Cryptology - ASIACRYPT 2017. Takagi, T. & Peyrin, T. (eds.). Cham: Springer, p. 158-186 (Lecture Notes in Computer Science; vol. 10624)

Research output: Research - peer-reviewConference contribution

Concealing Secrets in Embedded Processors Designs

Groß, H., Jelinek, M., Mangard, S., Unterluggauer, T. & Werner, M. 2017 15th Smart Card Research and Advanced Application Conference - CARDIS 2016. p. 89-104

Research output: Research - peer-reviewConference contribution

Open Access
Embedded systems
Hardware
Reduced instruction set computing
Transparency
Processing

Cryptanalysis of Simpira v1

Eichlseder, M., Dobraunig, C. E. & Mendel, F. 2017 Selected Areas in Cryptography - SAC 2016. Avanzi, R. & Heys, H. (eds.). Springer, p. 284-298 (Lecture Notes in Computer Science; vol. 10532)

Research output: Research - peer-reviewConference contribution

Open Access

Cryptographic Service Providers in Current Device Landscapes: An Inconvenient Truth

Reimair, F., Feichtner, J., Ziegler, D., Kreuzhuber, S. & Zefferer, T. Jul 2017 Proceedings of the 14th International Joint Conference on e-Business and Telecommunications. Portugal: SciTePress, Vol. 4, p. 367-374 8 p.

Research output: Research - peer-reviewConference contribution

Open Access
File
Data privacy
Security of data
Risk assessment
Hardware
Railroad cars
Testbeds
Trucks
Radio interference
Industrial plants

Gimli: a cross-platform permutation

Bernstein, D. J., Kölbl, S., Lucks, S., Massolino, P. M. C., Mendel, F., Nawaz, K., Schneider, T., Schwabe, P., Standaert, F-X., Todo, Y. & Viguier, B. 2017 Cryptographic Hardware and Embedded Systems. Springer, (LNCS)

Research output: Research - peer-reviewConference contribution

Harmonizing Delegation Data Formats

Wagner, G., Omolola, O. & More, S. J. 6 Oct 2017

Research output: Research - peer-reviewPaper

Higher-Order Side-Channel Protected Implementations of KECCAK

Groß, H., Schaffenrath, D. & Mangard, S. 2017 DSD. IEEE Computer Society, p. 205-212 8 p.

Research output: Research - peer-reviewConference contribution

Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation

Derler, D., Ramacher, S. & Slamanig, D. 2017 Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers. Springer Verlag, p. 124-142 (Lecture Notes in Computer Science; vol. 10322)

Research output: Research - peer-reviewConference contribution

Hybrid Mobile Edge Computing: Unleashing the Full Potential of Edge Computing in Mobile Device Use Cases

Reiter, A., Prünster, B. & Zefferer, T. 2017 Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing. IEEE Press, p. 935-944

Research output: Research - peer-reviewConference contribution

Mobile devices
Energy conservation
Energy utilization
Bandwidth
Internet of things

IAIK ECCelerate SDK 4.01

Ramacher, S. 23 Mar 2017

Research output: ResearchSoftware

IAIK ECCelerate SDK 4.02

Ramacher, S. 19 Jul 2017

Research output: ResearchSoftware

Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC

Dobraunig, C. E. & List, E. 2017 Topics in Cryptology -- CT-RSA 2017. Handschuh, H. (ed.). Springer, p. 207-222 16 p. (Lecture Notes in Computer Science; vol. 10159)

Research output: Research - peer-reviewChapter

Open Access

KASLR is Dead: Long Live KASLR

Gruss, D., Lipp, M., Schwarz, M., Fellner, R., Maurice, C. & Mangard, S. 2017 Engineering Secure Software and Systems - 9th International Symposium, ESSoS 2017, Proceedings. Springer-Verlag Italia, Vol. 10379 LNCS, p. 161-176 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10379 LNCS)

Research output: Research - peer-reviewConference contribution

kernel
Hardware
Plant shutdowns
Flow control
Side Channel Attacks

Leakage Bounds for Gaussian Side Channels

Unterluggauer, T., Korak, T., Mangard, S., Schilling, R., Benini, L., Gürkaynak, F. K. & Muehlberghuber, M. 2017 (Accepted/In press) 16th Smart Card Research and Advanced Application Conference - CARDIS 2017. Springer

Research output: Research - peer-reviewConference contribution

Open Access
Channel capacity
Application specific integrated circuits
Signal to noise ratio
Information theory
Cryptography

Leveraging the adoption of electronic identities and electronic-signature solutions in Europe

Marsalek, A., Zefferer, T., Reimair, F., Karabat, Ç. & Soykan, E. U. 3 Apr 2017 32nd Annual ACM Symposium on Applied Computing, SAC 2017. Association for Computing Machinery, Inc, Vol. Part F128005, p. 69-71 3 p.

Research output: Research - peer-reviewConference contribution

Concretes

Malware guard extension: Using SGX to conceal cache attacks

Schwarz, M., Weiser, S., Gruss, D., Maurice, C. & Mangard, S. 2017 Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, 2017. Springer-Verlag Italia, Vol. 10327 LNCS, p. 3-24 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10327 LNCS)

Research output: Research - peer-reviewConference contribution

Malware
Cache
Physical addresses
Attack
Hardware

Model-Based Testing IoT Communication via Active Automata Learning

Tappler, M., Aichernig, B. K. & Bloem, R. 2017 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST). p. 276-287 12 p.

Research output: Research - peer-reviewConference contribution

Communication
Testing
Specifications
Servers
Network protocols

Multi-core Data Analytics SoC with a flexible 1.76 Gbit/s AES-XTS Cryptographic Accelerator in 65 nm CMOS

Gürkaynak, F. K., Schilling, R., Mühlberghuber, M., Conti, F., Mangard, S. & Benini, L. 2017 CS2 '17, Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems . p. 19-24

Research output: Research - peer-reviewConference contribution

Optimizing Wavelet Bases for Sparser Representations

Grandits, T. A. & Pock, T. 10 Dec 2017 (Submitted) Proceedings of the 11th International Conference on Energy Minimization Methods in Computer Vision and Pattern Recognition.

Research output: Research - peer-reviewConference contribution

Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives

Chase, M., Derler, D., Goldfeder, S., Orlandi, C., Ramacher, S., Rechberger, C., Slamanig, D. & Zaverucha, G. 2017 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, USA, October 30 - November 3, 2017.

Research output: Research - peer-reviewConference contribution

Practical Keystroke Timing Attacks in Sandboxed JavaScript

Lipp, M., Gruss, D., Schwarz, M., Bidner, D., Maurice, C. & Mangard, S. 2017 Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings. Springer-Verlag Italia, Vol. 10493 LNCS, p. 191-209 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10493 LNCS)

Research output: Research - peer-reviewConference contribution

Timing Attack
JavaScript
Attack
Timing
Websites

Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures

Beck, M. T., Camenisch, J., Derler, D., Krenn, S., Pöhls, H. C., Samelin, K. & Slamanig, D. 2017 Information Security and Privacy - 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part I.

Research output: Research - peer-reviewConference contribution

Privacy Technologies and Policy

Schweighofer, E. (ed.), Leitold, H. (ed.), Mitrakas, A. (ed.) & Rannenberg, K. (ed.) 2017 Springer Verlag.

Research output: Research - peer-reviewBook

Open Access

Reconciling d+1 Masking in Hardware and Software

Groß, H. & Mangard, S. 2017 CHES. Springer, Vol. 10529, p. 115-136 22 p. (Lecture Notes in Computer Science)

Research output: Research - peer-reviewConference contribution

Related-Key Impossible-Differential Attack on Reduced-Round SKINNY

Ankele, R., Banik, S., Chakraborti, A., List, E., Mendel, F., Sim, S. M. & Wang, G. 2017 Applied Cryptography and Network Security. Cham, p. 208-228 (Lecture Notes in Computer Science; vol. 10355)

Research output: Research - peer-reviewConference contribution

Secure Policy-based Device-to-Device Offloading for Mobile Applications

Reiter, A. 2017 Proceedings of the Symposium on Applied Computing. Association of Computing Machinery, p. 516-521

Research output: Research - peer-reviewConference contribution

Mobile devices
Security of data
Servers
Virtual machine

Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives

Unterluggauer, T., Werner, M. & Mangard, S. 2017 ACM Asia Conference on Computer and Communications Security - ASIACCS'17. Association of Computing Machinery, p. 690-702

Research output: Research - peer-reviewConference contribution

Open Access
Authentication
Cryptography
Data storage equipment
Random access storage
Side channel attack

SGXIO: Generic Trusted I/O Path for Intel SGX

Weiser, S. & Werner, M. 2017

Research output: Research - peer-reviewPaper

Cloud computing
Hardware
Malware