Felix Günther

Affiliations:
  • ETH Zürich, Department of Computer Science, Applied Cryptography Group, Switzerland
  • University of California at San Diego, CA, USA (former)
  • Technische Universität Darmstadt, Germany (PhD 2018)


According to our database1, Felix Günther authored at least 34 papers between 2011 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
The Status of Quantum-Key-Distribution-Based Long-Term Secure Internet Communication.
IEEE Trans. Sustain. Comput., 2021

A Cryptographic Analysis of the TLS 1.3 Handshake Protocol.
J. Cryptol., 2021

KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round Trip.
IACR Cryptol. ePrint Arch., 2021

Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake.
IACR Cryptol. ePrint Arch., 2021

2020
Modeling advanced security aspects of key exchange and secure channel protocols.
it Inf. Technol., 2020

Information-Theoretic Security of Cryptographic Channels.
IACR Cryptol. ePrint Arch., 2020

Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3.
IACR Cryptol. ePrint Arch., 2020

Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols.
IACR Cryptol. ePrint Arch., 2020

Separate Your Domains: NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability.
IACR Cryptol. ePrint Arch., 2020

Towards Post-Quantum Security for Signal's X3DH Handshake.
Proceedings of the Selected Areas in Cryptography - SAC 2020, 2020

Modeling Memory Faults in Signature and Authenticated Encryption Schemes.
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020

2019
Modeling Memory Faults in Signature and Encryption Schemes.
IACR Cryptol. ePrint Arch., 2019

Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms.
IACR Cryptol. ePrint Arch., 2019

Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
Modeling Advanced Security Aspects of Key Exchange and Secure Channel Protocols.
PhD thesis, 2018

2017
Linkable message tagging: solving the key distribution problem of signature schemes.
Int. J. Inf. Sec., 2017

A Formal Treatment of Multi-key Channels.
IACR Cryptol. ePrint Arch., 2017

0-RTT Key Exchange with Full Forward Secrecy.
IACR Cryptol. ePrint Arch., 2017

Data Is a Stream: Security of Stream-Based Channels.
IACR Cryptol. ePrint Arch., 2017

Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates.
IACR Cryptol. ePrint Arch., 2017

Breakdown Resilience of Key Exchange Protocols and the Cases of NewHope and TLS 1.3.
IACR Cryptol. ePrint Arch., 2017

PRF-ODH: Relations, Instantiations, and Impossibility Results.
IACR Cryptol. ePrint Arch., 2017

The Status of Quantum-Based Long-Term Secure Communication over the Internet.
CoRR, 2017

CogniCrypt: supporting developers in using cryptography.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

2016
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol.
Int. J. Inf. Sec., 2016

Secure Logging Schemes and Certificate Transparency.
IACR Cryptol. ePrint Arch., 2016

A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol.
IACR Cryptol. ePrint Arch., 2016

Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

2015
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates.
IACR Cryptol. ePrint Arch., 2015

2014
Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation.
IACR Cryptol. ePrint Arch., 2014

Multi-Stage Key Exchange and the Case of Google's QUIC Protocol.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2011
Cryptographic Treatment of Private User Profiles.
IACR Cryptol. ePrint Arch., 2011

Pseudorandom Signatures.
IACR Cryptol. ePrint Arch., 2011

Key management in distributed online social networks.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011


  Loading...