Advertisement · 728 × 90

Posts by ISEC TU GRAZ

Post image Post image Post image Post image

Thank you for joining us at the TU Graz Open Day! 😊

1 week ago 0 0 0 0
Post image Post image Post image Post image

Yesterday, we celebrated the official opening of the new Cybersecurity Campus Graz building! 🔑✨

After the celebratory speeches, Verena Schröppel, Edona Fasllija, and Lukas Maar, three of our researchers, shared their academic journeys and research topics.

📸 photos by Lunghammer – TU Graz

2 weeks ago 0 0 0 0
Abstract. We present Poseidon2b, a version of Poseidon2 defined over binary extension fields. It is specifically designed to inherit many of the circuit-friendly properties of its prime field version, and to be used together with binary extension field proving systems such as Binius. Benchmarking demonstrates the merits around proof size, proving time, and especially verification time.

We also revisit recent attacks on Poseidon and Poseidon2 and discuss their applicability in the binary field extension setting, in addition to analyzing attack vectors that were not applicable in the prime field setting. In particular, we lay special focus on algebraic cryptanalysis and subspace trails, techniques which resulted in attacks on initial versions of Poseidon defined over binary extension fields.

Abstract. We present Poseidon2b, a version of Poseidon2 defined over binary extension fields. It is specifically designed to inherit many of the circuit-friendly properties of its prime field version, and to be used together with binary extension field proving systems such as Binius. Benchmarking demonstrates the merits around proof size, proving time, and especially verification time. We also revisit recent attacks on Poseidon and Poseidon2 and discuss their applicability in the binary field extension setting, in addition to analyzing attack vectors that were not applicable in the prime field setting. In particular, we lay special focus on algebraic cryptanalysis and subspace trails, techniques which resulted in attacks on initial versions of Poseidon defined over binary extension fields.

Poseidon2b: A Binary Field Version of Poseidon2 (Lorenzo Grassi, Dmitry Khovratovic, Katharina Koschatko, Christian Rechberger, Markus Schofnegger, Verena Schröppel) ia.cr/2025/1893

6 months ago 2 2 0 0

We officially got the key to the building yesterday! 🥰

2 weeks ago 1 0 0 0
Tour durch den Cybersecurity Campus Graz
Tour durch den Cybersecurity Campus Graz YouTube video by Technische Universität Graz

Have you wanted a closer looking into our new campus building? Check out this tour! 😉

youtu.be/FPqYrBGBR84?...

2 weeks ago 1 0 0 0
Post image

🎉 Congratulations, Martin! 🎉

Martin Heckel successfully defended his #PhD thesis “Real-World Rowhammer: Understanding and Addressing the Challenges to Rowhammer Attacks” yesterday. 🥳
We wish him the best in his future endeavors!

2 weeks ago 0 0 0 0
Post image

🎉 Congratulations, Aikata! 🎉

She successfully defended her #PhD thesis “Secure and Efficient Implementations of Post-Quantum Cryptographic Algorithms” today. 🥳
We wish her the best in her future endeavors!

3 weeks ago 4 0 0 0
Post image

The discovery of the longest pattern ever for DDR5 Rowhammer flips! 😱

📅 April 1sr, 2026 | 11:00
📍 CCG Seminar room, CCGEG002

Join us for Kaveh Razavi’s talk “Rowhammer bit flips a decade later”! 👇
www.isec.tugraz.at/event/rowham...

1 month ago 0 0 0 0
Post image Post image Post image

What a week!
Our move is completed and from now on, you can find us at Sandgasse 38a. 🎉

A big thank you to everyone who made this quick transition possible. 🫶

1 month ago 1 0 0 0
Advertisement
Preview
Continuous User Behavior Monitoring using DNS Cache Timing Attacks - NDSS Symposium

Hannes Weissteiner: Continuous User Behavior Monitoring using DNS Cache Timing Attacks
www.ndss-symposium.org/ndss-paper/c...

1 month ago 0 0 0 0
Preview
Eviction Notice: Reviving and Advancing Page Cache Attacks - NDSS Symposium

Sudheendra Neela: Eviction Notice: Reviving and Advancing Page Cache Attacks
www.ndss-symposium.org/ndss-paper/e...

1 month ago 1 1 1 0
Preview
Memory Band-Aid: A Principled Rowhammer Defense-in-Depth - NDSS Symposium

Carina Fiedler: Memory Band-Aid: A Principled Rowhammer Defense-in-Depth
www.ndss-symposium.org/ndss-paper/m...

1 month ago 0 0 1 0
Post image Post image Post image Post image

Our PhD students, Carina Fiedler, @snee.la and @hannesweissteiner.com attended the NDSS Symposium 2026 in San Diego, California, this week to present their papers!

Check them out in the thread 👇

1 month ago 4 2 1 0
Post image

We're waving goodbye to Inffeldgasse 16A! 👋

Today marks our final day here, and we're really excited about the adventures waiting for us at our fabulous new place at Sandgasse 38A.

We can't wait to see all of you there after the move! 🥳

2 months ago 1 1 0 0
Post image

🎉 Congratulations to Martin Unterguggenberger! 🎉

He successfully defended his #PhD thesis “Defense-in-Depth Techniques for Memory Safety in Hardware” today. 🎉
We wish him all the best in his future endeavors!

2 months ago 0 0 0 0

Congratulations @snee.la ! 🎉

3 months ago 2 0 0 0
Post image

Find us at the @tugraz.bsky.social booth at Educatio Budapest until January 10th, to find out about our study programms in information security! ☺️

#university #informationsecurity #computerscience

3 months ago 1 0 0 0
Post image Post image Post image

Thank you for joining our Bachelor@ISEC event in October, and congratulations to all award winners! 🍕❤️

Wishing you a wonderful holiday season! We can’t wait to see you all next year for more events at our institute! 🎄

3 months ago 0 0 0 0
Advertisement
Post image

🎉 Congratulations to Benedikt Maderbacher! 🎉

He successfully defended his #PhD thesis “Reactive Synthesis Modulo Theories” yesterday. 🎉
We wish him all the best for an amazing future ahead!

4 months ago 0 0 0 0

To enhance your experience, we're happy to announce that coincidentally a Mulled Wine Stand is happening right in front of HS i13 at the same time, so see you there!

4 months ago 0 0 0 0
Post image

Join us tomorrow for the InfoSec + SSD Christmas special, featuring real-world exploits, live hacking of various targets, information leaks, file formats, and a review of the year in security.

📅 December 17th, 2025 | 17:30
📍 Lecture Hall HS i13, Inffeldgasse 16b

4 months ago 4 1 1 0
Events – ISEC

Apart from defining these models, the talk also covers their application for the problems of reactive synthesis and probabilistic verification.

📅 December 18th, 2025 | 10:00
📍 ISEC meeting room (IFEG074), Inffeldgasse 16A

👉 www.isec.tugraz.at/events/

4 months ago 1 0 0 0
Post image

Join us for Rüdiger Ehlers’ talk on polynomial-time minimizable automata for omega-regular languages this Thursday!

His talk summarizes the main ideas of two recently introduced polynomial-time minimizable automaton models for omega-regular languages.

4 months ago 1 0 1 0


➜ Apply for the Master’s degree programs by ‼️ 15th December 2025 ‼️
www.tugraz.at/go/admission...

➜ Apply for the ‘Cybersecurity Scholarship’
tugraz.at/go/cybersecu...

4 months ago 1 0 0 0
Post image Post image

Specialise in Cybersecurity with the Master’s programs and kickstart your academic journey at TU Graz with the ‘Cybersecurity Scholarship’ (€4,000/semester) for international students! 🌍✨

Your future starts here—apply today! 🚀

#studyabroad #scholarship #informationtechnology #cybersecurity

4 months ago 1 0 1 0
Advertisement
Post image

Two of our courses were awarded the Student’s List Award! 🎉

It was presented to the best courses of the summer semester 2024 and winter semester 2024/25 in our faculty’s BME and CS/SEM/ICE programs by student representatives, based on student feedback.

4 months ago 0 0 0 0
Preview
Accelerating Hash-Based Polynomial Commitment Schemes with Linear Prover Time | IACR Transactions on Cryptographic Hardware and Embedded Systems Zero-knowledge proofs (ZKPs) are cryptographic protocols that enable one party to prove the validity of a statement without revealing any information beyond its truth. Central building blocks in many…

📄 Accelerating Hash-Based Polynomial Commitment Schemes with Linear Prover Time: doi.org/10.46586/tch...

4 months ago 1 0 0 0
Preview
ToFA: Towards Fault Analysis of GIFT and GIFT-like Ciphers Leveraging Truncated Impossible Differentials | IACR Transactions on Cryptographic Hardware and Embedded Systems In this work, we introduce ToFA, the first fault attack (FA) strategy that attempts to leverage the classically well-known idea of impossible differential cryptanalysis to mount practically…

📄 ToFA: Towards Fault Analysis of GIFT and GIFT-like Ciphers Leveraging Truncated Impossible Differentials: doi.org/10.46586/tch...

4 months ago 1 0 1 0
Preview
Skyscraper: Fast Hashing on Big Primes | IACR Transactions on Cryptographic Hardware and Embedded Systems Arithmetic hash functions defined over prime fields have been actively developed and used in verifiable computation (VC) protocols. Among those, ellipticcurve- based SNARKs require large (256-bit and…

📄 Skyscraper: Fast Hashing on Big Primes: doi.org/10.46586/tch...

4 months ago 1 0 1 0
Preview
REED: Chiplet-based Accelerator for Fully Homomorphic Encryption | IACR Transactions on Cryptographic Hardware and Embedded Systems Fully Homomorphic Encryption (FHE) enables privacy-preserving computation and has many applications. However, its practical implementation faces massive computation and memory overheads. To address…

📄 REED: Chiplet-based Accelerator for Fully Homomorphic Encryption: doi.org/10.46586/tch...

4 months ago 1 0 1 0