What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Stefan Mangard
Google Scholar
ORCID:
0000-0001-9650-8041
94
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/host
Cryptographic Least Privilege Enforcement for Scalable Memory Isolation.
Martin Unterguggenberger
David Schrammel
Lukas Maar
Lukas Lamster
Vedad Hadzic
Stefan Mangard
2025
conf/ndss
TME-Box: Scalable In-Process Isolation through Intel TME-MK Memory Encryption.
Martin Unterguggenberger
Lukas Lamster
David Schrammel
Martin Schwarzl
Stefan Mangard
2025
conf/ndss
KernelSnitch: Side Channel-Attacks on Kernel Data Structures.
Lukas Maar
Jonas Juffinger
Thomas Steinbauer
Daniel Gruss
Stefan Mangard
2025
conf/ndss
Power-Related Side-Channel Attacks using the Android Sensor Framework.
Mathias Oberhuber
Martin Unterguggenberger
Lukas Maar
Andreas Kogler
Stefan Mangard
2025
conf/esorics
WaitWatcher and WaitGuard: Detecting Flush-Based Cache Side-Channels Through Spurious Wakeups.
Lukas Lamster
Fabian Rauscher
Martin Unterguggenberger
Stefan Mangard
2025
conf/esorics
Code Encryption with Intel TME-MK for Control-Flow Enforcement.
Martin Unterguggenberger
Lukas Lamster
Mathias Oberhuber
Simon Scherer
Stefan Mangard
2025
conf/uss
ChoiceJacking: Compromising Mobile Devices through Malicious Chargers like a Decade ago.
Florian Draschbacher
Lukas Maar
Mathias Oberhuber
Stefan Mangard
2025
conf/uss
The Doom of Device Drivers: Your Android Device (Most Likely) has N-Day Kernel Vulnerabilities.
Lukas Maar
Florian Draschbacher
Lorenz Schumm
Ernesto Martínez García
Stefan Mangard
2025
conf/uss
When Good Kernel Defenses Go Bad: Reliable and Stable Kernel Exploits via Defense-Amplified TLB Side-Channel Leaks.
Lukas Maar
Lukas Giner
Daniel Gruss
Stefan Mangard
2024
journals/tches
Quantile: Quantifying Information Leakage.
Vedad Hadzic
Gaëtan Cassiers
Robert Primas
Stefan Mangard
Roderick Bloem
2024
journals/tches
Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults.
Simon Tollec
Vedad Hadzic
Pascal Nasahl
Mihail Asavoae
Roderick Bloem
Damien Couroussé
Karine Heydemann
Mathieu Jan
Stefan Mangard
2024
journals/tches
Compress: Generate Small and Fast Masked Pipelined Circuits.
Gaëtan Cassiers
Barbara Gigerl
Stefan Mangard
Charles Momin
Rishub Nagpal
2024
journals/tches
Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency.
Barbara Gigerl
Franz Klug
Stefan Mangard
Florian Mendel
Robert Primas
2024
journals/cic
On Loopy Belief Propagation for SASCAs: An Analysis and Empirical Study of the Inference Problem.
Rishub Nagpal
Gaëtan Cassiers
Robert Primas
Christian Knoll
Franz Pernkopf
Stefan Mangard
2024
conf/uss
Defects-in-Depth: Analyzing the Integration of Effective Defenses against One-Day Exploits in Android Kernels.
Lukas Maar
Florian Draschbacher
Lukas Lamster
Stefan Mangard
2024
conf/uss
SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel.
Lukas Maar
Stefan Gast
Martin Unterguggenberger
Mathias Oberhuber
Stefan Mangard
2024
conf/uss
Voodoo: Memory Tagging, Authenticated Encryption, and Error Correction through MAGIC.
Lukas Lamster
Martin Unterguggenberger
David Schrammel
Stefan Mangard
2024
conf/eurosp
Memory Tagging using Cryptographic Integrity on Commodity x86 CPUs.
David Schrammel
Martin Unterguggenberger
Lukas Lamster
Salmin Sultana
Karanvir Grewal
Michael LeMay
David M. Durham
Stefan Mangard
2024
conf/host
Security Aspects of Masking on FPGAs.
Barbara Gigerl
Kevin Pretterhofer
Stefan Mangard
2024
conf/asiaccs
Beyond the Edges of Kernel Control-Flow Hijacking Protection with HEK-CFI.
Lukas Maar
Pascal Nasahl
Stefan Mangard
2023
conf/ccs
Cryptographically Enforced Memory Safety.
Martin Unterguggenberger
David Schrammel
Lukas Lamster
Pascal Nasahl
Stefan Mangard
2023
conf/uss
Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels.
Andreas Kogler
Jonas Juffinger
Lukas Giner
Lukas Gerlach
Martin Schwarzl
Michael Schwarz
Daniel Gruss
Stefan Mangard
2023
conf/uss
HashTag: Hash-based Integrity Protection for Tagged Architectures.
Lukas Lamster
Martin Unterguggenberger
David Schrammel
Stefan Mangard
2023
conf/sp
Scatter and Split Securely: Defeating Cache Contention and Occupancy Attacks.
Lukas Giner
Stefan Steinegger
Antoon Purnal
Maria Eichlseder
Thomas Unterluggauer
Stefan Mangard
Daniel Gruss
2023
conf/acns
Formal Verification of Arithmetic Masking in Hardware and Software.
Barbara Gigerl
Robert Primas
Stefan Mangard
2023
conf/host
EC-CFI: Control-Flow Integrity via Code Encryption Counteracting Fault Attacks.
Pascal Nasahl
Salmin Sultana
Hans Liljestrand
Karanvir Grewal
Michael LeMay
David M. Durham
David Schrammel
Stefan Mangard
2023
conf/asiaccs
Secure Context Switching of Masked Software Implementations.
Barbara Gigerl
Robert Primas
Stefan Mangard
2023
conf/asiaccs
Multi-Tag: A Hardware-Software Co-Design for Memory Safety based on Multi-Granular Memory Tagging.
Martin Unterguggenberger
David Schrammel
Pascal Nasahl
Robert Schilling
Lukas Lamster
Stefan Mangard
2023
conf/asiaccs
SPEAR-V: Secure and Practical Enclave Architecture for RISC-V.
David Schrammel
Moritz Waser
Lukas Lamster
Martin Unterguggenberger
Stefan Mangard
2023
conf/acsac
DOPE: DOmain Protection Enforcement with PKS.
Lukas Maar
Martin Schwarzl
Fabian Rauscher
Daniel Gruss
Stefan Mangard
2022
journals/tches
Riding the Waves Towards Generic Single-Cycle Masking in Hardware.
Rishub Nagpal
Barbara Gigerl
Robert Primas
Stefan Mangard
2022
journals/tches
SYNFI: Pre-Silicon Fault Analysis of an Open-Source Secure Element.
Pascal Nasahl
Miguel Osorio
Pirmin Vogel
Michael Schaffner
Timothy Trippel
Dominic Rizzo
Stefan Mangard
2022
conf/ccs
Power Contracts: Provably Complete Power Leakage Models for Processors.
Roderick Bloem
Barbara Gigerl
Marc Gourjon
Vedad Hadzic
Stefan Mangard
Robert Primas
2022
conf/uss
Jenny: Securing Syscalls for PKU-based Memory Isolation Systems.
David Schrammel
Samuel Weiser
Richard Sadek
Stefan Mangard
2021
conf/uss
Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs.
Barbara Gigerl
Vedad Hadzic
Robert Primas
Stefan Mangard
Roderick Bloem
2021
conf/esorics
SERVAS! Secure Enclaves via RISC-V Authenticryption Shield.
Stefan Steinegger
David Schrammel
Samuel Weiser
Pascal Nasahl
Stefan Mangard
2021
conf/host
SecWalk: Protecting Page Table Walks Against Fault Attacks.
Robert Schilling
Pascal Nasahl
Stefan Weiglhofer
Stefan Mangard
2021
conf/host
Protecting Indirect Branches Against Fault Attacks Using ARM Pointer Authentication.
Pascal Nasahl
Robert Schilling
Stefan Mangard
2021
conf/asiaccs
HECTOR-V: A Heterogeneous CPU Architecture for a Secure RISC-V Execution Environment.
Pascal Nasahl
Robert Schilling
Mario Werner
Stefan Mangard
2021
conf/asiaccs
CrypTag: Thwarting Physical and Logical Memory Vulnerabilities using Cryptographically Colored Memory.
Pascal Nasahl
Robert Schilling
Mario Werner
Jan Hoogerbrugge
Marcel Medwed
Stefan Mangard
2021
conf/asiacrypt
Secure and Efficient Software Masking on Superscalar Pipelined Processors.
Barbara Gigerl
Robert Primas
Stefan Mangard
2020
journals/tosc
Isap v2.0.
Christoph Dobraunig
Maria Eichlseder
Stefan Mangard
Florian Mendel
Bart Mennink
Robert Primas
Thomas Unterluggauer
2020
conf/uss
Donky: Domain Keys - Efficient In-Process Isolation for RISC-V and x86.
David Schrammel
Samuel Weiser
Stefan Steinegger
Martin Schwarzl
Michael Schwarz
Stefan Mangard
Daniel Gruss
2019
conf/ccs
First-Order Masking with Only Two Random Bits.
Hannes Groß
Ko Stoffelen
Lauren De Meyer
Martin Krenn
Stefan Mangard
2019
conf/uss
ScatterCache: Thwarting Cache Attacks via Cache Set Randomization.
Mario Werner
Thomas Unterluggauer
Lukas Giner
Michael Schwarz
Daniel Gruss
Stefan Mangard
2019
conf/sp
Spectre Attacks: Exploiting Speculative Execution.
Paul Kocher
Jann Horn
Anders Fogh
Daniel Genkin
Daniel Gruss
Werner Haas
Mike Hamburg
Moritz Lipp
Stefan Mangard
Thomas Prescher
Michael Schwarz
Yuval Yarom
2019
conf/ndss
TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V.
Samuel Weiser
Mario Werner
Ferdinand Brasser
Maja Malenko
Stefan Mangard
Ahmad-Reza Sadeghi
2018
journals/tches
SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography.
Christoph Dobraunig
Maria Eichlseder
Thomas Korak
Stefan Mangard
Florian Mendel
Robert Primas
2018
conf/ccs
ProcHarvester: Fully Automated Analysis of Procfs Side-Channel Leaks on Android.
Raphael Spreitzer
Felix Kirchengast
Daniel Gruss
Stefan Mangard
2018
conf/ccs
Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features.
Michael Schwarz
Daniel Gruss
Moritz Lipp
Clémentine Maurice
Thomas Schuster
Anders Fogh
Stefan Mangard
2018
conf/uss
Meltdown: Reading Kernel Memory from User Space.
Moritz Lipp
Michael Schwarz
Daniel Gruss
Thomas Prescher
Werner Haas
Anders Fogh
Jann Horn
Stefan Mangard
Paul Kocher
Daniel Genkin
Yuval Yarom
Mike Hamburg
2018
conf/uss
DATA - Differential Address Trace Analysis: Finding Address-based Side-Channels in Binaries.
Samuel Weiser
Andreas Zankl
Raphael Spreitzer
Katja Miller
Stefan Mangard
Georg Sigl
2018
conf/eurosp
Sponge-Based Control-Flow Protection for IoT Devices.
Mario Werner
Thomas Unterluggauer
David Schaffenrath
Stefan Mangard
2018
conf/ndss
KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks.
Michael Schwarz
Moritz Lipp
Daniel Gruss
Samuel Weiser
Clémentine Maurice
Raphael Spreitzer
Stefan Mangard
2018
conf/eurocrypt
Formal Verification of Masked Hardware Implementations in the Presence of Glitches.
Roderick Bloem
Hannes Groß
Rinat Iusupov
Bettina Könighofer
Stefan Mangard
Johannes Winter
2018
conf/asiacrypt
Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures.
Christoph Dobraunig
Maria Eichlseder
Hannes Groß
Stefan Mangard
Florian Mendel
Robert Primas
2018
conf/acsac
Pointing in the Right Direction - Securing Memory Accesses in a Faulty World.
Robert Schilling
Mario Werner
Pascal Nasahl
Stefan Mangard
2018
conf/wisec
SCAnDroid: Automated Side-Channel Analysis of Android APIs.
Raphael Spreitzer
Gerald Palfinger
Stefan Mangard
2018
conf/sacrypt
Fault Attacks on Nonce-Based Authenticated Encryption: Application to Keyak and Ketje.
Christoph Dobraunig
Stefan Mangard
Florian Mendel
Robert Primas
2017
journals/tosc
ISAP - Towards Side-Channel Secure Authenticated Encryption.
Christoph Dobraunig
Maria Eichlseder
Stefan Mangard
Florian Mendel
Thomas Unterluggauer
2017
conf/ccs
Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives.
Thomas Unterluggauer
Mario Werner
Stefan Mangard
2017
conf/fc
Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript.
Michael Schwarz
Clémentine Maurice
Daniel Gruss
Stefan Mangard
2017
conf/esorics
Practical Keystroke Timing Attacks in Sandboxed JavaScript.
Moritz Lipp
Daniel Gruss
Michael Schwarz
David Bidner
Clémentine Maurice
Stefan Mangard
2017
conf/ches
Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption.
Robert Primas
Peter Pessl
Stefan Mangard
2017
conf/ches
Reconciling d+1 Masking in Hardware and Software.
Hannes Groß
Stefan Mangard
2017
conf/ndss
Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud.
Clémentine Maurice
Manuel Weber
Michael Schwarz
Lukas Giner
Daniel Gruss
Carlo Alberto Boano
Stefan Mangard
Kay Römer
2017
conf/ctrsa
An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order.
Hannes Groß
Stefan Mangard
Thomas Korak
2016
conf/ccs
Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order.
Hannes Groß
Stefan Mangard
Thomas Korak
2016
conf/ccs
Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR.
Daniel Gruss
Clémentine Maurice
Anders Fogh
Moritz Lipp
Stefan Mangard
2016
conf/uss
ARMageddon: Cache Attacks on Mobile Devices.
Moritz Lipp
Daniel Gruss
Raphael Spreitzer
Clémentine Maurice
Stefan Mangard
2016
conf/uss
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks.
Peter Pessl
Daniel Gruss
Clémentine Maurice
Michael Schwarz
Stefan Mangard
2016
conf/ctrsa
Enhancing Side-Channel Analysis of Binary-Field Multiplication with Bit Reliability.
Peter Pessl
Stefan Mangard
2016
conf/wisec
Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android.
Raphael Spreitzer
Simone Griesmayr
Thomas Korak
Stefan Mangard
2015
conf/uss
Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches.
Daniel Gruss
Raphael Spreitzer
Stefan Mangard
2015
conf/esorics
Practical Memory Deduplication Attacks in Sandboxed Javascript.
Daniel Gruss
David Bidner
Stefan Mangard
2015
conf/fdtc
Fault Attacks at the System Level - The Challenge of Securing Application Software.
Stefan Mangard
2012
conf/ctrsa
Localized Electromagnetic Analysis of Cryptographic Implementations.
Johann Heyszl
Stefan Mangard
Benedikt Heinz
Frederic Stumpf
Georg Sigl
2010
conf/asiacrypt
The World Is Not Enough: Another Look on Second-Order DPA.
François-Xavier Standaert
Nicolas Veyrat-Charvillon
Elisabeth Oswald
Benedikt Gierlichs
Marcel Medwed
Markus Kasper
Stefan Mangard
2009
conf/ctrsa
Practical Attacks on Masked Hardware.
Thomas Popp
Mario Kirschbaum
Stefan Mangard
2007
conf/acns
Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis.
Stefan Tillich
Christoph Herbst
Stefan Mangard
2007
conf/ches
Power and EM Attacks on Passive 13.56 MHz RFID Devices.
Michael Hutter
Stefan Mangard
Martin Feldhofer
2007
conf/ches
Evaluation of the Masked Logic Style MDPL on a Prototype Chip.
Thomas Popp
Mario Kirschbaum
Thomas Zefferer
Stefan Mangard
2007
conf/ctrsa
Template Attacks on Masking - Resistance Is Futile.
Elisabeth Oswald
Stefan Mangard
2006
conf/acns
An AES Smart Card Implementation Resistant to Power Analysis Attacks.
Christoph Herbst
Elisabeth Oswald
Stefan Mangard
2006
conf/ches
Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations.
Stefan Mangard
Kai Schramm
2006
conf/wisa
Investigations of Power Analysis Attacks and Countermeasures for ARIA.
HyungSo Yoo
Christoph Herbst
Stefan Mangard
Elisabeth Oswald
Sang-Jae Moon
2006
conf/ctrsa
Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers.
Elisabeth Oswald
Stefan Mangard
Christoph Herbst
Stefan Tillich
2005
conf/fse
A Side-Channel Analysis Resistant Description of the AES S-Box.
Elisabeth Oswald
Stefan Mangard
Norbert Pramstaller
Vincent Rijmen
2005
conf/ches
Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints.
Thomas Popp
Stefan Mangard
2005
conf/ches
Successfully Attacking Masked AES Hardware Implementations.
Stefan Mangard
Norbert Pramstaller
Elisabeth Oswald
2005
conf/ctrsa
Side-Channel Leakage of Masked CMOS Gates.
Stefan Mangard
Thomas Popp
Berndt M. Gammel
2004
conf/ctrsa
Hardware Countermeasures against DPA ? A Statistical Analysis of Their Effectiveness.
Stefan Mangard
2002
conf/icisc
A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion.
Stefan Mangard
2001
conf/ccs
A new approach to DNS security (DNSSEC).
Giuseppe Ateniese
Stefan Mangard
Coauthors
Ahmad-Reza Sadeghi
(1)
Anders Fogh
(4)
Andreas Kogler
(2)
Andreas Zankl
(1)
Antoon Purnal
(1)
Barbara Gigerl
(9)
Bart Mennink
(1)
Benedikt Gierlichs
(1)
Benedikt Heinz
(1)
Berndt M. Gammel
(1)
Bettina Könighofer
(1)
Carlo Alberto Boano
(1)
Charles Momin
(1)
Christian Knoll
(1)
Christoph Dobraunig
(5)
Christoph Herbst
(4)
Clémentine Maurice
(8)
Damien Couroussé
(1)
Daniel Genkin
(2)
Daniel Gruss
(20)
David Bidner
(2)
David M. Durham
(2)
David Schaffenrath
(1)
David Schrammel
(12)
Dominic Rizzo
(1)
Elisabeth Oswald
(7)
Ernesto Martínez García
(1)
Fabian Rauscher
(2)
Felix Kirchengast
(1)
Ferdinand Brasser
(1)
Florian Draschbacher
(3)
Florian Mendel
(6)
François-Xavier Standaert
(1)
Franz Klug
(1)
Franz Pernkopf
(1)
Frederic Stumpf
(1)
Gaëtan Cassiers
(3)
Georg Sigl
(2)
Gerald Palfinger
(1)
Giuseppe Ateniese
(1)
Hannes Groß
(6)
Hans Liljestrand
(1)
HyungSo Yoo
(1)
Jan Hoogerbrugge
(1)
Jann Horn
(2)
Johann Heyszl
(1)
Johannes Winter
(1)
Jonas Juffinger
(2)
Kai Schramm
(1)
Karanvir Grewal
(2)
Karine Heydemann
(1)
Katja Miller
(1)
Kay Römer
(1)
Kevin Pretterhofer
(1)
Ko Stoffelen
(1)
Lauren De Meyer
(1)
Lorenz Schumm
(1)
Lukas Gerlach
(1)
Lukas Giner
(5)
Lukas Lamster
(11)
Lukas Maar
(10)
Maja Malenko
(1)
Manuel Weber
(1)
Marc Gourjon
(1)
Marcel Medwed
(2)
Maria Eichlseder
(5)
Mario Kirschbaum
(2)
Mario Werner
(7)
Markus Kasper
(1)
Martin Feldhofer
(1)
Martin Krenn
(1)
Martin Schwarzl
(4)
Martin Unterguggenberger
(12)
Mathias Oberhuber
(4)
Mathieu Jan
(1)
Michael Hutter
(1)
Michael LeMay
(2)
Michael Schaffner
(1)
Michael Schwarz
(11)
Miguel Osorio
(1)
Mihail Asavoae
(1)
Mike Hamburg
(2)
Moritz Lipp
(7)
Moritz Waser
(1)
Nicolas Veyrat-Charvillon
(1)
Norbert Pramstaller
(2)
Pascal Nasahl
(12)
Paul Kocher
(2)
Peter Pessl
(3)
Pirmin Vogel
(1)
Raphael Spreitzer
(7)
Richard Sadek
(1)
Rinat Iusupov
(1)
Rishub Nagpal
(3)
Robert Primas
(14)
Robert Schilling
(6)
Roderick Bloem
(5)
Salmin Sultana
(2)
Samuel Weiser
(6)
Sang-Jae Moon
(1)
Simon Scherer
(1)
Simon Tollec
(1)
Simone Griesmayr
(1)
Stefan Gast
(1)
Stefan Mangard
(94)
Stefan Steinegger
(3)
Stefan Tillich
(2)
Stefan Weiglhofer
(1)
Thomas Korak
(4)
Thomas Popp
(4)
Thomas Prescher
(2)
Thomas Schuster
(1)
Thomas Steinbauer
(1)
Thomas Unterluggauer
(6)
Thomas Zefferer
(1)
Timothy Trippel
(1)
Vedad Hadzic
(5)
Vincent Rijmen
(1)
Werner Haas
(2)
Yuval Yarom
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to