Felix Günther

Home

Publications

Talks

Publications

By type, most recent first. Authorship, as common in the crypto community, in alphabetical order.
(See also: dblp, Google Scholar)

Preprints

  1. Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3
    Marc Fischlin, Felix Günther, and Christian Janson
    Available as Cryptology ePrint Archive Report 2020/718.
  2. Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms
    Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson, and Douglas Stebila
    Available as Cryptology ePrint Archive Report 2019/1356.

Journal Articles

  1. The Status of Quantum-Key-Distribution-Based Long-Term Secure Internet Communication
    Matthias Geihs, Oleg Nikiforov, Denise Demirel, Alexander Sauer, Denis Butin, Felix Günther, Gernot Alber, Thomas Walther, and Johannes Buchmann
    IEEE Transactions on Sustainable Computing, ??(?):??–??. IEEE, 2019.
    The original publication is available at IEEE.
  2. Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes
    Felix Günther and Bertram Poettering
    International Journal of Information Security (IJIS), 16(3):281–297. Springer, 2017.
    The original publication is available at Springer. Available as Cryptology ePrint Archive Report 2014/014.
  3. Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol
    Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, and Kenneth G. Paterson
    International Journal of Information Security (IJIS), 15(6):637–657. Springer, 2016.
    The original publication is available at Springer. Available as Cryptology ePrint Archive Report 2014/728.

Papers in Conferences and Workshops with Proceedings

  1. Information-Theoretic Security of Cryptographic Channels (to appear)
    Marc Fischlin, Felix Günther, and Philipp Muth
    22nd International Conference on Information and Communications Security (ICICS), Lecture Notes in Computer Science, Volume ?????, pp. ??–??. Springer, August 2020.
  2. Separate Your Domains: NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability [PDF]
    Mihir Bellare, Hannah Davis, and Felix Günther
    39th International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2020), Lecture Notes in Computer Science, Volume 12106, pp. 3–32. Springer, May 2020.
    The original publication is available at Springer. Available as Cryptology ePrint Archive Report 2020/241.
  3. Modeling Memory Faults in Signature and Authenticated Encryption Schemes [PDF]
    Marc Fischlin and Felix Günther
    Cryptographer's Track at the RSA Conference 2020 (CT-RSA 2020), Lecture Notes in Computer Science, Volume 12006, pp. 56–84. Springer, February 2020.
    The original publication is available at Springer. Available as Cryptology ePrint Archive Report 2019/1053.
  4. Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids (best paper award) [PDF]
    Jacqueline Brendel, Marc Fischlin, and Felix Günther
    24th European Symposium on Research in Computer Security (ESORICS 2019), Lecture Notes in Computer Science, Volume 11736, pp. 521–541. Springer, September 2019.
    The original publication is available at Springer. Available as Cryptology ePrint Archive Report 2017/1252.
  5. CogniCrypt: Supporting Developers in using Cryptography [PDF]
    Stefan Krüger, Sarah Nadi, Michael Reif, Karim Ali, Mira Mezini, Eric Bodden, Florian Göpfert, Felix Günther, Christian Weinert, Daniel Demmler, and Ram Kamath
    32nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2017), pp. 931–936. IEEE Press, October 2017.
    The original publication is available at ACM.
  6. PRF-ODH: Relations, Instantiations, and Impossibility Results [PDF]
    Jacqueline Brendel, Marc Fischlin, Felix Günther, and Christian Janson
    37th International Cryptology Conference (CRYPTO 2017), Lecture Notes in Computer Science, Volume 10403, pp. 651–681. Springer, August 2017.
    The original publication is available at Springer. Available as Cryptology ePrint Archive Report 2017/517.
  7. A Formal Treatment of Multi-key Channels [PDF]
    Felix Günther and Sogol Mazaheri
    37th International Cryptology Conference (CRYPTO 2017), Lecture Notes in Computer Science, Volume 10403, pp. 587–618. Springer, August 2017.
    The original publication is available at Springer. Available as Cryptology ePrint Archive Report 2017/501.
  8. 0-RTT Key Exchange with Full Forward Secrecy [PDF]
    Felix Günther, Britta Hale, Tibor Jager, and Sebastian Lauer
    36th International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2017), Lecture Notes in Computer Science, Volume 10212, pp. 519–548. Springer, April 2017.
    The original publication is available at Springer. Available as Cryptology ePrint Archive Report 2017/223.
  9. Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates [PDF]
    Marc Fischlin and Felix Günther
    2nd IEEE European Symposium on Security and Privacy (EuroS&P 2017), pp. 60–75. IEEE, April 2017.
    The original publication is available at IEEE. Available as Cryptology ePrint Archive Report 2017/082.
  10. Secure Logging Schemes and Certificate Transparency [PDF]
    Benjamin Dowling, Felix Günther, Udyani Herath, and Douglas Stebila
    21st European Symposium on Research in Computer Security (ESORICS 2016), Lecture Notes in Computer Science, Volume 9879, pp. 140–158. Springer, September 2016.
    The original publication is available at Springer. Available as Cryptology ePrint Archive Report 2016/452.
  11. Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3
    Marc Fischlin, Felix Günther, Benedikt Schmidt, and Bogdan Warinschi
    37th IEEE Symposium on Security and Privacy (S&P 2016), pp. 452–469. IEEE, May 2016.
    The original publication is available at IEEE.
  12. A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates [PDF]
    Benjamin Dowling, Marc Fischlin, Felix Günther, and Douglas Stebila
    22nd ACM Conference on Computer and Communications Security (CCS 2015), pp. 1197–1210. ACM, October 2015.
    The original publication is available at ACM. Available as Cryptology ePrint Archive Report 2015/914.
  13. Data Is a Stream: Security of Stream-Based Channels [PDF]
    Marc Fischlin, Felix Günther, Giorgia Azzurra Marson, and Kenneth G. Paterson
    35th International Cryptology Conference (CRYPTO 2015), Lecture Notes in Computer Science, Volume 9216, pp. 545–564. Springer, August 2015.
    The original publication is available at Springer. Available as Cryptology ePrint Archive Report 2017/1191.
  14. Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes (best student paper award) [PDF]
    Felix Günther and Bertram Poettering
    20th Australasian Conference on Information Security and Privacy (ACISP 2015), Lecture Notes in Computer Science, Volume 9144, pp. 195–212. Springer, June 2015.
    The original publication is available at Springer. Available as Cryptology ePrint Archive Report 2014/014.
  15. Unpicking PLAID – A Cryptographic Analysis of an ISO-standards-track Authentication Protocol [PDF]
    Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, and Kenneth G. Paterson
    1st International Conference on Research in Security Standardisation (SSR 2014), Lecture Notes in Computer Science, Volume 8893, pp. 1–25. Springer, December 2014.
    The original publication is available at Springer. Available as Cryptology ePrint Archive Report 2014/728.
  16. Multi-Stage Key Exchange and the Case of Google's QUIC Protocol [PDF]
    Marc Fischlin and Felix Günther
    21st ACM Conference on Computer and Communications Security (CCS 2014), pp. 1193–1204. ACM, November 2014.
    The original publication is available at ACM.
  17. Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation [PDF]
    Felix Günther, Mark Manulis, and Andreas Peter
    13th International Conference on Cryptology and Network Security (CANS 2014), Lecture Notes in Computer Science, Volume 8813, pp. 321–336. Springer, October 2014.
    The original publication is available at Springer. Available as Cryptology ePrint Archive Report 2014/382.
  18. Pseudorandom Signatures [PDF]
    Nils Fleischhacker, Felix Günther, Franziskus Kiefer, Mark Manulis, and Bertram Poettering
    8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), pp. 107–118. ACM, May 2013.
    The original publication is available at ACM. Available as Cryptology ePrint Archive Report 2011/673.
  19. Key Management in Distributed Online Social Networks [PDF]
    Felix Günther, Mark Manulis, and Thorsten Strufe
    12th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2011) / D-SPAN Workshop, pp. 1–7. IEEE, June 2011.
    The original publication is available at IEEE.
  20. Cryptographic Treatment of Private User Profiles [PDF]
    Felix Günther, Mark Manulis, and Thorsten Strufe
    15th International Conference on Financial Cryptography and Data Security (FC 2011) / RLCPS Workshop, Lecture Notes in Computer Science, Volume 7126, pp. 40–54. Springer, March 2011.
    The original publication is available at Springer. Available as Cryptology ePrint Archive Report 2011/064.

Papers in Workshops without Proceedings

  1. A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol [PDF]
    Benjamin Dowling, Marc Fischlin, Felix Günther, and Douglas Stebila
    IACR Cryptology ePrint Archive 2016/081, January 2016.
    Presented at the TRON (TLS1.3 – Ready or Not?) Workshop / NDSS 2016, Februar 2016.

    Available as Cryptology ePrint Archive Report 2016/081.
  2. Efficient Implementation of Code-Based Identification Schemes [PDF]
    Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui, Felix Günther, Gerhard Hoffmann, and Holger Rother
    Technical Report, presented at the Western European Workshop on Research in Cryptology (WEWoRC 2011), July 2011.

Surveys

  1. Group Signatures: Authentication with Privacy [PDF]
    Mark Manulis, Nils Fleischhacker, Felix Günther, Franziskus Kiefer, and Bertram Poettering
    Survey for the BSI (German Federal Office for Information Security), 2012.

Theses

  1. Modeling Advanced Security Aspects of Key Exchange and Secure Channel Protocols [PDF]
    Felix Günther
    Ph.D. thesis, Technische Universität Darmstadt, Darmstadt, Germany, February 2018.
  2. Privacy-Preserving Participatory Sensing with Data Aggregation [PDF]
    Felix Günther
    Master thesis, Technische Universität Darmstadt, Darmstadt, Germany, March 2013.
  3. Cryptographic Treatment of Private User Profiles [PDF]
    Felix Günther
    Bachelor thesis, Technische Universität Darmstadt, Darmstadt, Germany, November 2010.

Felix Günther

Dr. rer. nat. Felix Günther

ETH Zurich
Department of Computer Science
Institute of Information Security
Applied Cryptography Group

Postal address:
Institut f. Informationssicherheit, CNB E 104.1
Universitätstrasse 6
8092 Zürich
Switzerland

Email:mail[DELETE-THIS]@felixguenther.info
PGP:0x52AF0200D3F1700E
Phone:+41 44 632 86 47
Office:CNB E 104.1

ETHZ

Copyright notice
The documents contained in these directories are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.

Data Protection Declaration / Privacy Policy