Felix Günther

Orcid: 0000-0002-8495-6610

Affiliations:
  • IBM Research Europe, Zurich, Switzerland
  • ETH Zürich, Department of Computer Science, Applied Cryptography Group, Switzerland (former)
  • University of California at San Diego, CA, USA (former)
  • Technische Universität Darmstadt, Germany (PhD 2018)


According to our database1, Felix Günther authored at least 52 papers between 2011 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
XHMQV: Better Efficiency and Stronger Security for Signal's Initial Handshake based on HMQV.
IACR Cryptol. ePrint Arch., 2025

Security Analysis of Signal's sfPQXDH Handshake.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

Key Derivation Functions Without a Grain of Salt.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Hybrid Obfuscated Key Exchange and KEMs.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

Verifiable Decapsulation: Recognizing Faulty Implementations of Post-quantum KEMs.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

sfXHMQV: Better Efficiency and Stronger Security for Signal's Initial Handshake based on HMQV.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

Breaking and Fixing Content-Defined Chunking.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

2024
Security Analysis of Signal's PQXDH Handshake.
IACR Cryptol. ePrint Arch., 2024

A Formal Treatment of End-to-End Encrypted Cloud Storage.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Obfuscated Key Exchange.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Careful with MAc-then-SIGn: A Computational Analysis of the EDHOC Lightweight Authenticated Key Exchange Protocol.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

When Messages Are Keys: Is HMAC a Dual-PRF?
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Verifiable Verification in Cryptographic Protocols.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake.
Proceedings of the Public-Key Cryptography - PKC 2022, 2022

On the Concrete Security of TLS 1.3 PSK Mode.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Continuous Authentication in Secure Messaging.
Proceedings of the Computer Security - ESORICS 2022, 2022

Puncturable Key Wrapping and Its Applications.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round Trip.
Proceedings of the Applied Cryptography and Network Security, 2022

2021
The Status of Quantum-Key-Distribution-Based Long-Term Secure Internet Communication.
IEEE Trans. Sustain. Comput., 2021

KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round Trip.
IACR Cryptol. ePrint Arch., 2021

The Security of ChaCha20-Poly1305 in the Multi-User Setting.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols.
Proceedings of the Applied Cryptography and Network Security, 2021

2020
Modeling advanced security aspects of key exchange and secure channel protocols.
it Inf. Technol., 2020

Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3.
IACR Cryptol. ePrint Arch., 2020

A Cryptographic Analysis of the TLS 1.3 Handshake Protocol.
IACR Cryptol. ePrint Arch., 2020

Towards Post-Quantum Security for Signal's X3DH Handshake.
Proceedings of the Selected Areas in Cryptography - SAC 2020, 2020

Information-Theoretic Security of Cryptographic Channels.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

Separate Your Domains: NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Modeling Memory Faults in Signature and Authenticated Encryption Schemes.
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020

2019
Modeling Memory Faults in Signature and Encryption Schemes.
IACR Cryptol. ePrint Arch., 2019

Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms.
IACR Cryptol. ePrint Arch., 2019

Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
Modeling Advanced Security Aspects of Key Exchange and Secure Channel Protocols.
PhD thesis, 2018

2017
Breakdown Resilience of Key Exchange Protocols and the Cases of NewHope and TLS 1.3.
IACR Cryptol. ePrint Arch., 2017

The Status of Quantum-Based Long-Term Secure Communication over the Internet.
CoRR, 2017

CogniCrypt: supporting developers in using cryptography.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

0-RTT Key Exchange with Full Forward Secrecy.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

PRF-ODH: Relations, Instantiations, and Impossibility Results.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

A Formal Treatment of Multi-key Channels.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2016
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol.
IACR Cryptol. ePrint Arch., 2016

Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Secure Logging Schemes and Certificate Transparency.
Proceedings of the Computer Security - ESORICS 2016, 2016

2015
Data Is a Stream: Security of Stream-Based Channels.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014
Unpicking PLAID - A Cryptographic Analysis of an ISO-Standards-Track Authentication Protocol.
Proceedings of the Security Standardisation Research - First International Conference, 2014

Multi-Stage Key Exchange and the Case of Google's QUIC Protocol.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation.
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014

2013
Pseudorandom signatures.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2011
Key management in distributed online social networks.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Cryptographic Treatment of Private User Profiles.
Proceedings of the Financial Cryptography and Data Security, 2011


  Loading...