Felix Günther

Home

Publications

Talks

Publications

By type, most recent first. Authorship, as common in the crypto community, in alphabetical order.
(See also: dblp, Google Scholar)

Journal Articles

  • Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes
    Felix Günther and Bertram Poettering
    International Journal of Information Security (IJIS), 16(3):281–297. Springer, 2017.
    The original publication is available at Springer.
  • Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol
    Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, and Kenneth G. Paterson
    International Journal of Information Security (IJIS), 15(6):637–657. Springer, 2016.
    The original publication is available at Springer.

Papers in Conferences and Workshops with Proceedings

  • CogniCrypt: Supporting Developers in using Cryptography [PDF]
    Stefan Krüger, Sarah Nadi, Michael Reif, Karim Ali, Mira Mezini, Eric Bodden, Florian Göpfert, Felix Günther, Christian Weinert, Daniel Demmler, and Ram Kamath
    32nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2017), pp. 931–936. IEEE Press, October 2017.
    The original publication is available at ACM.
  • PRF-ODH: Relations, Instantiations, and Impossibility Results [PDF]
    Jacqueline Brendel, Marc Fischlin, Felix Günther, and Christian Janson
    37th International Cryptology Conference (CRYPTO 2017), Lecture Notes in Computer Science, Volume 10403, pp. 651–681. Springer, August 2017.
    The original publication is available at Springer.
  • A Formal Treatment of Multi-key Channels [PDF]
    Felix Günther and Sogol Mazaheri
    37th International Cryptology Conference (CRYPTO 2017), Lecture Notes in Computer Science, Volume 10403, pp. 587–618. Springer, August 2017.
    The original publication is available at Springer.
  • 0-RTT Key Exchange with Full Forward Secrecy [PDF]
    Felix Günther, Britta Hale, Tibor Jager, and Sebastian Lauer
    36th International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2017), Lecture Notes in Computer Science, Volume 10212, pp. 519–548. Springer, April 2017.
    The original publication is available at Springer.
  • Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates [PDF]
    Marc Fischlin and Felix Günther
    2nd IEEE European Symposium on Security and Privacy (EuroS&P 2017), pp. 60–75. IEEE, April 2017.
    The original publication is available at IEEE.
  • Secure Logging Schemes and Certificate Transparency [PDF]
    Benjamin Dowling, Felix Günther, Udyani Herath, and Douglas Stebila
    21st European Symposium on Research in Computer Security (ESORICS 2016), Lecture Notes in Computer Science, Volume 9879, pp. 140–158. Springer, September 2016.
    The original publication is available at Springer.
  • Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3
    Marc Fischlin, Felix Günther, Benedikt Schmidt, and Bogdan Warinschi
    37th IEEE Symposium on Security and Privacy (S&P 2016), pp. 452–469. IEEE, May 2016.
    The original publication is available at IEEE.
  • A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates [PDF]
    Benjamin Dowling, Marc Fischlin, Felix Günther, and Douglas Stebila
    22nd ACM Conference on Computer and Communications Security (CCS 2015), pp. 1197–1210. ACM, October 2015.
    The original publication is available at ACM.
  • Data Is a Stream: Security of Stream-Based Channels [PDF]
    Marc Fischlin, Felix Günther, Giorgia Azzurra Marson, and Kenneth G. Paterson
    35th International Cryptology Conference (CRYPTO 2015), Lecture Notes in Computer Science, Volume 9216, pp. 545–564. Springer, August 2015.
    The original publication is available at Springer.
  • Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes (best student paper) [PDF]
    Felix Günther and Bertram Poettering
    20th Australasian Conference on Information Security and Privacy (ACISP 2015), Lecture Notes in Computer Science, Volume 9144, pp. 195–212. Springer, June 2015.
    The original publication is available at Springer.
  • Unpicking PLAID – A Cryptographic Analysis of an ISO-standards-track Authentication Protocol [PDF]
    Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, and Kenneth G. Paterson
    1st International Conference on Research in Security Standardisation (SSR 2014), Lecture Notes in Computer Science, Volume 8893, pp. 1–25. Springer, December 2014.
    The original publication is available at Springer.
  • Multi-Stage Key Exchange and the Case of Google's QUIC Protocol [PDF]
    Marc Fischlin and Felix Günther
    21st ACM Conference on Computer and Communications Security (CCS 2014), pp. 1193–1204. ACM, November 2014.
    The original publication is available at ACM.
  • Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation [PDF]
    Felix Günther, Mark Manulis, and Andreas Peter
    13th International Conference on Cryptology and Network Security (CANS 2014), Lecture Notes in Computer Science, Volume 8813, pp. 321–336. Springer, October 2014.
    The original publication is available at Springer.
  • Pseudorandom Signatures [PDF] [Full Version PDF]
    Nils Fleischhacker, Felix Günther, Franziskus Kiefer, Mark Manulis, and Bertram Poettering
    8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), pp. 107–118. ACM, May 2013.
    The original publication is available at ACM.
  • Key Management in Distributed Online Social Networks [PDF]
    Felix Günther, Mark Manulis, and Thorsten Strufe
    12th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2011) / D-SPAN Workshop, pp. 1–7. IEEE, June 2011.
    The original publication is available at IEEE.
  • Cryptographic Treatment of Private User Profiles [PDF] [Full Version PDF]
    Felix Günther, Mark Manulis, and Thorsten Strufe
    15th International Conference on Financial Cryptography and Data Security (FC 2011) / RLCPS Workshop, Lecture Notes in Computer Science, Volume 7126, pp. 40–54. Springer, March 2011.
    The original publication is available at Springer.

Papers in Workshops without Proceedings

  • A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol [PDF]
    Benjamin Dowling, Marc Fischlin, Felix Günther, and Douglas Stebila
    IACR Cryptology ePrint Archive 2016/081, January 2016.
    Presented at the TRON (TLS1.3 – Ready or Not?) Workshop / NDSS 2016, Februar 2016.
  • Efficient Implementation of Code-Based Identification Schemes [PDF]
    Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui, Felix Günther, Gerhard Hoffmann, and Holger Rother
    Technical Report, presented at the Western European Workshop on Research in Cryptology (WEWoRC 2011), July 2011.

Surveys

  • Group Signatures: Authentication with Privacy [PDF]
    Mark Manulis, Nils Fleischhacker, Felix Günther, Franziskus Kiefer, and Bertram Poettering
    Survey for the BSI (German Federal Office for Information Security), 2012.

Theses

  • Modeling Advanced Security Aspects of Key Exchange and Secure Channel Protocols [PDF]
    Felix Günther
    Ph.D. thesis, Technische Universität Darmstadt, Darmstadt, Germany, February 2018.
  • Privacy-Preserving Participatory Sensing with Data Aggregation [PDF]
    Felix Günther
    Master thesis, Technische Universität Darmstadt, Darmstadt, Germany, March 2013.
  • Cryptographic Treatment of Private User Profiles [PDF]
    Felix Günther
    Bachelor thesis, Technische Universität Darmstadt, Darmstadt, Germany, November 2010.

Felix Günther

Dr. rer. nat. Felix Günther

Technische Universität Darmstadt
Department of Computer Science
Cryptography and Complexity Theory Group
Mornewegstrasse 30
64293 Darmstadt
Germany

Office:S4|14 4.3.21
Phone:+49 6151 16-25733
Email:guenther[DELETE-THIS]@cs.tu-darmstadt.de
PGP:0x52AF0200D3F1700E

Cryptoplexity
Technische Universität Darmstadt
CROSSING

Copyright notice
The documents contained in these directories are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.

Data Protection Declaration / Privacy Policy