Publications
By type, most recent first.
Authorship, as common in the crypto community, in alphabetical order.
(See also:
dblp,
Google Scholar)
Preprints
-
Usage Limits on AEAD Algorithms
Felix Günther, Martin Thomson, and Christopher A. Wood
IRTF/CFRG Internet-Draft. draft-irtf-cfrg-aead-limits.
-
Security Analysis of Signal's PQXDH Handshake
Rune Fiedler and Felix Günther
Available as Cryptology ePrint Archive Report 2024/702.
Peer-Reviewed Journal Articles
-
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3
Marc Fischlin, Felix Günther, and Christian Janson
Journal of Cryptology, 37(2):9. Springer, 2024.
Original publication at Springer. DOI: 10.1007/s00145-023-09489-9. Available as Cryptology ePrint Archive Report 2020/718.
Presented at RWC 2021. -
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol
Benjamin Dowling, Marc Fischlin, Felix Günther, and Douglas Stebila
Journal of Cryptology, 34(4):37. Springer, 2021.
Original publication at Springer. DOI: 10.1007/s00145-021-09384-1. Available as Cryptology ePrint Archive Report 2020/1044. -
The Status of Quantum-Key-Distribution-Based Long-Term Secure Internet Communication [PDF]
Matthias Geihs, Oleg Nikiforov, Denise Demirel, Alexander Sauer, Denis Butin, Felix Günther, Gernot Alber, Thomas Walther, and Johannes Buchmann
IEEE Transactions on Sustainable Computing, 6(1):19–29. IEEE, 2021.
Original publication at IEEE. DOI: 10.1109/TSUSC.2019.2913948. -
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes
Felix Günther and Bertram Poettering
International Journal of Information Security (IJIS), 16(3):281–297. Springer, 2017.
Original publication at Springer. DOI: 10.1007/s10207-016-0327-z. Available as Cryptology ePrint Archive Report 2014/014. -
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol
Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, and Kenneth G. Paterson
International Journal of Information Security (IJIS), 15(6):637–657. Springer, 2016.
Original publication at Springer. DOI: 10.1007/s10207-015-0309-6. Available as Cryptology ePrint Archive Report 2014/728.
Peer-Reviewed Papers in Conferences and Workshops with Proceedings
-
Obfuscated Key Exchange (to appear)
Felix Günther, Douglas Stebila, and Shannon Veitch
31st ACM Conference on Computer and Communications Security (CCS 2024), pp. ??–??. ACM, October 2024.
Available as Cryptology ePrint Archive Report 2024/1086.
Presented at RWC 2024. -
A Formal Treatment of End-to-End Encrypted Cloud Storage
Matilda Backendal, Hannah Davis, Felix Günther, Miro Haller, and Kenneth G. Paterson
44th Annual International Cryptology Conference (CRYPTO 2024), Lecture Notes in Computer Science, Volume 14921, pp. 40–74. Springer, August 2024.
Original publication at Springer. DOI: 10.1007/978-3-031-68379-4_2. Available as Cryptology ePrint Archive Report 2024/989. -
Verifiable Verification in Cryptographic Protocols
Marc Fischlin and Felix Günther
30th ACM Conference on Computer and Communications Security (CCS 2023), pp. 3239–3253. ACM, November 2023.
Original publication at ACM. DOI: 10.1145/3576915.3623151. Available as Cryptology ePrint Archive Report 2023/1214.
Presented at RWC 2024. -
When Messages Are Keys: Is HMAC a dual-PRF?
Matilda Backendal, Mihir Bellare, Felix Günther, and Matteo Scarlata
43rd Annual International Cryptology Conference (CRYPTO 2023), Lecture Notes in Computer Science, Volume 14083, pp. 661–693. Springer, August 2023.
Original publication at Springer. DOI: 10.1007/978-3-031-38548-3_22. Available as Cryptology ePrint Archive Report 2023/861. -
Careful with MAc-then-SIGn: A Computational Analysis of the EDHOC Lightweight Authenticated Key Exchange Protocol
Felix Günther and Marc Ilunga Tshibumbu Mukendi
8th IEEE European Symposium on Security and Privacy (EuroS&P 2023), pp. 773–796. IEEE, July 2023.
Original publication at IEEE. DOI: 10.1109/EuroSP57164.2023.00051. Available as Cryptology ePrint Archive Report 2022/1705.
Presented at RWC 2023. -
Puncturable Key Wrapping and Its Applications
Matilda Backendal, Felix Günther, and Kenneth G. Paterson
28th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2022), Lecture Notes in Computer Science, Volume 13792, pp. 651–681. Springer, December 2022.
Original publication at Springer. DOI: 10.1007/978-3-031-22966-4_22. Available as Cryptology ePrint Archive Report 2022/1209. -
Continuous Authentication in Secure Messaging
Benjamin Dowling, Felix Günther, and Alexandre Poirrier
27th European Symposium on Research in Computer Security (ESORICS 2022), Lecture Notes in Computer Science, Volume 13555, pp. 361–381. Springer, September 2022.
Original publication at Springer. DOI: 10.1007/978-3-031-17146-8_18. Available as Cryptology ePrint Archive Report 2022/1215.
Presented at RWC 2022. -
KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round Trip
Felix Günther, Simon Rastikian, Patrick Towa, and Thom Wiggers
20th International Conference on Applied Cryptography and Network Security (ACNS 2022), Lecture Notes in Computer Science, Volume 13269, pp. 253–272. Springer, June 2022.
Original publication at Springer. DOI: 10.1007/978-3-031-09234-3_13. Available as Cryptology ePrint Archive Report 2021/725. -
On the Concrete Security of TLS 1.3 PSK Mode
Hannah Davis, Denis Diemert, Felix Günther, and Tibor Jager
41st Annual International Conference on the Theory and Applications of Cryptology and Information Security (EUROCRYPT 2022), Lecture Notes in Computer Science, Volume 13276 pp. 876–906. Springer, May/June 2022.
Original publication at Springer. DOI: 10.1007/978-3-031-07085-3_30. Available as Cryptology ePrint Archive Report 2022/246.
Presented at RWC 2022. -
Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake
Jacquline Brendel, Rune Fiedler, Felix Günther, Christian Janson, and Douglas Stebila
25th International Conference on Practice and Theory of Public-Key Cryptography (PKC 2022), Lecture Notes in Computer Science, Volume 13178, pp. 3–34. Springer, March 2022.
Original publication at Springer. DOI: 10.1007/978-3-030-97131-1_1. Available as Cryptology ePrint Archive Report 2021/769.
Presented at RWC 2022. -
The Security of ChaCha20-Poly1305 in the Multi-User Setting
Jean Paul Degabriele, Jérôme Govinden, Felix Günther, and Kenneth G. Paterson
28th ACM Conference on Computer and Communications Security (CCS 2021), pp. 1981–2003. ACM, November 2021.
Original publication at ACM. DOI: 10.1145/3460120.3484814. Available as Cryptology ePrint Archive Report 2023/085. -
Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols
Hannah Davis and Felix Günther
19th International Conference on Applied Cryptography and Network Security (ACNS 2021), Lecture Notes in Computer Science, Volume 12727, pp. 448–479. Springer, June 2021.
Original publication at Springer. DOI: 10.1007/978-3-030-78375-4_18. Available as Cryptology ePrint Archive Report 2020/1029. -
Towards Post-Quantum Security for Signal's X3DH Handshake
Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson, and Douglas Stebila
27th Conference on Selected Areas in Cryptography (SAC 2020), Lecture Notes in Computer Science, Volume 12804, pp. 404–430. Springer, October 2020.
Original publication at Springer. DOI: 10.1007/978-3-030-81652-0_16. Available as Cryptology ePrint Archive Report 2019/1356. -
Information-Theoretic Security of Cryptographic Channels [PDF]
Marc Fischlin, Felix Günther, and Philipp Muth
22nd International Conference on Information and Communications Security (ICICS 2020), Lecture Notes in Computer Science, Volume 12282, pp. 295–311. Springer, August 2020.
Original publication at Springer. DOI: 10.1007/978-3-030-61078-4_17. Available as Cryptology ePrint Archive Report 2020/1539. -
Separate Your Domains: NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability [PDF]
Mihir Bellare, Hannah Davis, and Felix Günther
39th International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2020), Lecture Notes in Computer Science, Volume 12106, pp. 3–32. Springer, May 2020.
Original publication at Springer. DOI: 10.1007/978-3-030-45724-2_1. Available as Cryptology ePrint Archive Report 2020/241. -
Modeling Memory Faults in Signature and Authenticated Encryption Schemes [PDF]
Marc Fischlin and Felix Günther
Cryptographer's Track at the RSA Conference 2020 (CT-RSA 2020), Lecture Notes in Computer Science, Volume 12006, pp. 56–84. Springer, February 2020.
Original publication at Springer. DOI: 10.1007/978-3-030-40186-3_4. Available as Cryptology ePrint Archive Report 2019/1053. -
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids (best paper award) [PDF]
Jacqueline Brendel, Marc Fischlin, and Felix Günther
24th European Symposium on Research in Computer Security (ESORICS 2019), Lecture Notes in Computer Science, Volume 11736, pp. 521–541. Springer, September 2019.
Original publication at Springer. DOI: 10.1007/978-3-030-29962-0_25. Available as Cryptology ePrint Archive Report 2017/1252. -
CogniCrypt: Supporting Developers in using Cryptography [PDF]
Stefan Krüger, Sarah Nadi, Michael Reif, Karim Ali, Mira Mezini, Eric Bodden, Florian Göpfert, Felix Günther, Christian Weinert, Daniel Demmler, and Ram Kamath
32nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2017), pp. 931–936. IEEE Press, October 2017.
Original publication at ACM. -
PRF-ODH: Relations, Instantiations, and Impossibility Results [PDF]
Jacqueline Brendel, Marc Fischlin, Felix Günther, and Christian Janson
37th Annual International Cryptology Conference (CRYPTO 2017), Lecture Notes in Computer Science, Volume 10403, pp. 651–681. Springer, August 2017.
Original publication at Springer. DOI: 10.1007/978-3-319-63697-9_22. Available as Cryptology ePrint Archive Report 2017/517. -
A Formal Treatment of Multi-key Channels [PDF]
Felix Günther and Sogol Mazaheri
37th Annual International Cryptology Conference (CRYPTO 2017), Lecture Notes in Computer Science, Volume 10403, pp. 587–618. Springer, August 2017.
Original publication at Springer. DOI: 10.1007/978-3-319-63697-9_20. Available as Cryptology ePrint Archive Report 2017/501. -
0-RTT Key Exchange with Full Forward Secrecy [PDF]
Felix Günther, Britta Hale, Tibor Jager, and Sebastian Lauer
36th International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2017), Lecture Notes in Computer Science, Volume 10212, pp. 519–548. Springer, April 2017.
Original publication at Springer. DOI: 10.1007/978-3-319-56617-7_18. Available as Cryptology ePrint Archive Report 2017/223.
Presented at RWC 2017. -
Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates [PDF]
Marc Fischlin and Felix Günther
2nd IEEE European Symposium on Security and Privacy (EuroS&P 2017), pp. 60–75. IEEE, April 2017.
Original publication at IEEE. DOI: 10.1109/EuroSP.2017.18. Available as Cryptology ePrint Archive Report 2017/082. -
Secure Logging Schemes and Certificate Transparency [PDF]
Benjamin Dowling, Felix Günther, Udyani Herath, and Douglas Stebila
21st European Symposium on Research in Computer Security (ESORICS 2016), Lecture Notes in Computer Science, Volume 9879, pp. 140–158. Springer, September 2016.
Original publication at Springer. DOI: 10.1007/978-3-319-45741-3_8. Available as Cryptology ePrint Archive Report 2016/452. -
Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3 [PDF]
Marc Fischlin, Felix Günther, Benedikt Schmidt, and Bogdan Warinschi
37th IEEE Symposium on Security and Privacy (S&P 2016), pp. 452–469. IEEE, May 2016.
Original publication at IEEE. DOI: 10.1109/SP.2016.34. -
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates [PDF]
Benjamin Dowling, Marc Fischlin, Felix Günther, and Douglas Stebila
22nd ACM Conference on Computer and Communications Security (CCS 2015), pp. 1197–1210. ACM, October 2015.
Original publication at ACM. DOI: 10.1145/2810103.2813653. Available as Cryptology ePrint Archive Report 2015/914. -
Data Is a Stream: Security of Stream-Based Channels [PDF]
Marc Fischlin, Felix Günther, Giorgia Azzurra Marson, and Kenneth G. Paterson
35th Annual International Cryptology Conference (CRYPTO 2015), Lecture Notes in Computer Science, Volume 9216, pp. 545–564. Springer, August 2015.
Original publication at Springer. DOI: 10.1007/978-3-662-48000-7_27. Available as Cryptology ePrint Archive Report 2017/1191. -
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes (best student paper award) [PDF]
Felix Günther and Bertram Poettering
20th Australasian Conference on Information Security and Privacy (ACISP 2015), Lecture Notes in Computer Science, Volume 9144, pp. 195–212. Springer, June 2015.
Original publication at Springer. DOI: 10.1007/978-3-319-19962-7_12. Available as Cryptology ePrint Archive Report 2014/014. -
Unpicking PLAID – A Cryptographic Analysis of an ISO-standards-track Authentication Protocol [PDF]
Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, and Kenneth G. Paterson
1st International Conference on Research in Security Standardisation (SSR 2014), Lecture Notes in Computer Science, Volume 8893, pp. 1–25. Springer, December 2014.
Original publication at Springer. DOI: 10.1007/978-3-319-14054-4_1. Available as Cryptology ePrint Archive Report 2014/728. -
Multi-Stage Key Exchange and the Case of Google's QUIC Protocol [PDF]
Marc Fischlin and Felix Günther
21st ACM Conference on Computer and Communications Security (CCS 2014), pp. 1193–1204. ACM, November 2014.
Original publication at ACM. DOI: 10.1145/2660267.2660308. -
Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation [PDF]
Felix Günther, Mark Manulis, and Andreas Peter
13th International Conference on Cryptology and Network Security (CANS 2014), Lecture Notes in Computer Science, Volume 8813, pp. 321–336. Springer, October 2014.
Original publication at Springer. DOI: 10.1007/978-3-319-12280-9_21. Available as Cryptology ePrint Archive Report 2014/382. -
Pseudorandom Signatures [PDF]
Nils Fleischhacker, Felix Günther, Franziskus Kiefer, Mark Manulis, and Bertram Poettering
8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), pp. 107–118. ACM, May 2013.
Original publication at ACM. DOI: 10.1145/2484313.2484325. Available as Cryptology ePrint Archive Report 2011/673. -
Key Management in Distributed Online Social Networks [PDF]
Felix Günther, Mark Manulis, and Thorsten Strufe
12th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2011) / D-SPAN Workshop, pp. 1–7. IEEE, June 2011.
Original publication at IEEE. DOI: 10.1109/WoWMoM.2011.5986171. -
Cryptographic Treatment of Private User Profiles [PDF]
Felix Günther, Mark Manulis, and Thorsten Strufe
15th International Conference on Financial Cryptography and Data Security (FC 2011) / RLCPS Workshop, Lecture Notes in Computer Science, Volume 7126, pp. 40–54. Springer, March 2011.
Original publication at Springer. DOI: 10.1007/978-3-642-29889-9_5. Available as Cryptology ePrint Archive Report 2011/064.
Papers in Workshops without Proceedings
-
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol [PDF]
Benjamin Dowling, Marc Fischlin, Felix Günther, and Douglas Stebila
Presented at the TRON (TLS1.3 – Ready or Not?) Workshop / NDSS 2016, Februar 2016.
Available as Cryptology ePrint Archive Report 2016/081. -
Efficient Implementation of Code-Based Identification Schemes [PDF]
Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui, Felix Günther, Gerhard Hoffmann, and Holger Rother
Technical Report, presented at the Western European Workshop on Research in Cryptology (WEWoRC 2011), July 2011.
Journal Articles by Invitation
-
Modeling advanced security aspects of key exchange and secure channel protocols [PDF]
Felix Günther
it - Information Technology (Distinguished Dissertations). De Gruyter Oldenbourg, 2020. By invitation as finalist for the CAST/German Informatics Society Doctoral Dissertation Award in IT Security.
Original publication at De Gruyter. DOI: 10.1515/itit-2020-0029.
Books (as Editor)
-
Security Standardisation Research: 8th International Conference, SSR 2023, Lyon, France, April 22-23, 2023, Proceedings
Felix Günther and Julia Hesse (Eds.)
Lecture Notes in Computer Science, Volume 13895. Springer, April 2023.
Original publication at Springer.
Surveys
-
Group Signatures: Authentication with Privacy [PDF]
Mark Manulis, Nils Fleischhacker, Felix Günther, Franziskus Kiefer, and Bertram Poettering
Survey for the BSI (German Federal Office for Information Security), 2012.
Theses
-
Modeling Advanced Security Aspects of Key Exchange and Secure Channel Protocols [PDF]
Felix Günther
Ph.D. thesis, Technische Universität Darmstadt, Darmstadt, Germany, February 2018.
-
Privacy-Preserving Participatory Sensing with Data Aggregation [PDF]
Felix Günther
Master thesis, Technische Universität Darmstadt, Darmstadt, Germany, March 2013.
-
Cryptographic Treatment of Private User Profiles [PDF]
Felix Günther
Bachelor thesis, Technische Universität Darmstadt, Darmstadt, Germany, November 2010.
Dr. Felix Günther
IBM Research Europe – Zurich
Postal address:
Säumerstrasse 4
8803 Rüschlikon
Switzerland
Email: | |
PGP: | 0x52AF0200D3F1700E |