Felix Günther

Home

Publications

Talks

Publications

By type, most recent first. Authorship, as common in the crypto community, in alphabetical order.
(See also: dblp, Google Scholar)

Preprints

  1. Usage Limits on AEAD Algorithms
    Felix Günther, Martin Thomson, and Christopher A. Wood
    IRTF/CFRG Internet-Draft. draft-irtf-cfrg-aead-limits.

Peer-Reviewed Journal Articles

  1. Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3
    Marc Fischlin, Felix Günther, and Christian Janson
    Journal of Cryptology, 37(2):9. Springer, 2024.
    Original publication at Springer. DOI: 10.1007/s00145-023-09489-9. Available as Cryptology ePrint Archive Report 2020/718.
    Presented at RWC 2021.
  2. A Cryptographic Analysis of the TLS 1.3 Handshake Protocol
    Benjamin Dowling, Marc Fischlin, Felix Günther, and Douglas Stebila
    Journal of Cryptology, 34(4):37. Springer, 2021.
    Original publication at Springer. DOI: 10.1007/s00145-021-09384-1. Available as Cryptology ePrint Archive Report 2020/1044.
  3. The Status of Quantum-Key-Distribution-Based Long-Term Secure Internet Communication [PDF]
    Matthias Geihs, Oleg Nikiforov, Denise Demirel, Alexander Sauer, Denis Butin, Felix Günther, Gernot Alber, Thomas Walther, and Johannes Buchmann
    IEEE Transactions on Sustainable Computing, 6(1):19–29. IEEE, 2021.
    Original publication at IEEE. DOI: 10.1109/TSUSC.2019.2913948.
  4. Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes
    Felix Günther and Bertram Poettering
    International Journal of Information Security (IJIS), 16(3):281–297. Springer, 2017.
    Original publication at Springer. DOI: 10.1007/s10207-016-0327-z. Available as Cryptology ePrint Archive Report 2014/014.
  5. Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol
    Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, and Kenneth G. Paterson
    International Journal of Information Security (IJIS), 15(6):637–657. Springer, 2016.
    Original publication at Springer. DOI: 10.1007/s10207-015-0309-6. Available as Cryptology ePrint Archive Report 2014/728.

Peer-Reviewed Papers in Conferences and Workshops with Proceedings

  1. Verifiable Verification in Cryptographic Protocols
    Marc Fischlin and Felix Günther
    30th ACM Conference on Computer and Communications Security (CCS 2023), pp. 3239–3253. ACM, November 2023.
    Original publication at ACM. DOI: 10.1145/3576915.3623151. Available as Cryptology ePrint Archive Report 2023/1214.
  2. When Messages Are Keys: Is HMAC a dual-PRF?
    Matilda Backendal, Mihir Bellare, Felix Günther, and Matteo Scarlata
    43rd International Cryptology Conference (CRYPTO 2023), Lecture Notes in Computer Science, Volume 14083, pp. 661–693. Springer, August 2023.
    Original publication at Springer. DOI: 10.1007/978-3-031-38548-3_22. Available as Cryptology ePrint Archive Report 2023/861.
  3. Careful with MAc-then-SIGn: A Computational Analysis of the EDHOC Lightweight Authenticated Key Exchange Protocol
    Felix Günther and Marc Ilunga Tshibumbu Mukendi
    8th IEEE European Symposium on Security and Privacy (EuroS&P 2023), pp. 773–796. IEEE, July 2023.
    Original publication at IEEE. DOI: 10.1109/EuroSP57164.2023.00051. Available as Cryptology ePrint Archive Report 2022/1705.
    Presented at RWC 2023.
  4. Puncturable Key Wrapping and Its Applications
    Matilda Backendal, Felix Günther, and Kenneth G. Paterson
    28th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2022), Lecture Notes in Computer Science, Volume 13792, pp. 651–681. Springer, December 2022.
    Original publication at Springer. DOI: 10.1007/978-3-031-22966-4_22. Available as Cryptology ePrint Archive Report 2022/1209.
  5. Continuous Authentication in Secure Messaging
    Benjamin Dowling, Felix Günther, and Alexandre Poirrier
    27th European Symposium on Research in Computer Security (ESORICS 2022), Lecture Notes in Computer Science, Volume 13555, pp. 361–381. Springer, September 2022.
    Original publication at Springer. DOI: 10.1007/978-3-031-17146-8_18. Available as Cryptology ePrint Archive Report 2022/1215.
    Presented at RWC 2022.
  6. KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round Trip
    Felix Günther, Simon Rastikian, Patrick Towa, and Thom Wiggers
    20th International Conference on Applied Cryptography and Network Security (ACNS 2022), Lecture Notes in Computer Science, Volume 13269, pp. 253–272. Springer, June 2022.
    Original publication at Springer. DOI: 10.1007/978-3-031-09234-3_13. Available as Cryptology ePrint Archive Report 2021/725.
  7. On the Concrete Security of TLS 1.3 PSK Mode
    Hannah Davis, Denis Diemert, Felix Günther, and Tibor Jager
    41st Annual International Conference on the Theory and Applications of Cryptology and Information Security (EUROCRYPT 2022), Lecture Notes in Computer Science, Volume 13276 pp. 876–906. Springer, May/June 2022.
    Original publication at Springer. DOI: 10.1007/978-3-031-07085-3_30. Available as Cryptology ePrint Archive Report 2022/246.
    Presented at RWC 2022.
  8. Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake
    Jacquline Brendel, Rune Fiedler, Felix Günther, Christian Janson, and Douglas Stebila
    25th International Conference on Practice and Theory of Public-Key Cryptography (PKC 2022), Lecture Notes in Computer Science, Volume 13178, pp. 3–34. Springer, March 2022.
    Original publication at Springer. DOI: 10.1007/978-3-030-97131-1_1. Available as Cryptology ePrint Archive Report 2021/769.
    Presented at RWC 2022.
  9. The Security of ChaCha20-Poly1305 in the Multi-User Setting
    Jean Paul Degabriele, Jérôme Govinden, Felix Günther, and Kenneth G. Paterson
    28th ACM Conference on Computer and Communications Security (CCS 2021), pp. 1981–2003. ACM, November 2021.
    Original publication at ACM. DOI: 10.1145/3460120.3484814. Available as Cryptology ePrint Archive Report 2023/085.
  10. Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols
    Hannah Davis and Felix Günther
    19th International Conference on Applied Cryptography and Network Security (ACNS 2021), Lecture Notes in Computer Science, Volume 12727, pp. 448–479. Springer, June 2021.
    Original publication at Springer. DOI: 10.1007/978-3-030-78375-4_18. Available as Cryptology ePrint Archive Report 2020/1029.
  11. Towards Post-Quantum Security for Signal's X3DH Handshake
    Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson, and Douglas Stebila
    27th Conference on Selected Areas in Cryptography (SAC 2020), Lecture Notes in Computer Science, Volume 12804, pp. 404–430. Springer, October 2020.
    Original publication at Springer. DOI: 10.1007/978-3-030-81652-0_16. Available as Cryptology ePrint Archive Report 2019/1356.
  12. Information-Theoretic Security of Cryptographic Channels [PDF]
    Marc Fischlin, Felix Günther, and Philipp Muth
    22nd International Conference on Information and Communications Security (ICICS 2020), Lecture Notes in Computer Science, Volume 12282, pp. 295–311. Springer, August 2020.
    Original publication at Springer. DOI: 10.1007/978-3-030-61078-4_17. Available as Cryptology ePrint Archive Report 2020/1539.
  13. Separate Your Domains: NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability [PDF]
    Mihir Bellare, Hannah Davis, and Felix Günther
    39th International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2020), Lecture Notes in Computer Science, Volume 12106, pp. 3–32. Springer, May 2020.
    Original publication at Springer. DOI: 10.1007/978-3-030-45724-2_1. Available as Cryptology ePrint Archive Report 2020/241.
  14. Modeling Memory Faults in Signature and Authenticated Encryption Schemes [PDF]
    Marc Fischlin and Felix Günther
    Cryptographer's Track at the RSA Conference 2020 (CT-RSA 2020), Lecture Notes in Computer Science, Volume 12006, pp. 56–84. Springer, February 2020.
    Original publication at Springer. DOI: 10.1007/978-3-030-40186-3_4. Available as Cryptology ePrint Archive Report 2019/1053.
  15. Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids (best paper award) [PDF]
    Jacqueline Brendel, Marc Fischlin, and Felix Günther
    24th European Symposium on Research in Computer Security (ESORICS 2019), Lecture Notes in Computer Science, Volume 11736, pp. 521–541. Springer, September 2019.
    Original publication at Springer. DOI: 10.1007/978-3-030-29962-0_25. Available as Cryptology ePrint Archive Report 2017/1252.
  16. CogniCrypt: Supporting Developers in using Cryptography [PDF]
    Stefan Krüger, Sarah Nadi, Michael Reif, Karim Ali, Mira Mezini, Eric Bodden, Florian Göpfert, Felix Günther, Christian Weinert, Daniel Demmler, and Ram Kamath
    32nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2017), pp. 931–936. IEEE Press, October 2017.
    Original publication at ACM.
  17. PRF-ODH: Relations, Instantiations, and Impossibility Results [PDF]
    Jacqueline Brendel, Marc Fischlin, Felix Günther, and Christian Janson
    37th International Cryptology Conference (CRYPTO 2017), Lecture Notes in Computer Science, Volume 10403, pp. 651–681. Springer, August 2017.
    Original publication at Springer. DOI: 10.1007/978-3-319-63697-9_22. Available as Cryptology ePrint Archive Report 2017/517.
  18. A Formal Treatment of Multi-key Channels [PDF]
    Felix Günther and Sogol Mazaheri
    37th International Cryptology Conference (CRYPTO 2017), Lecture Notes in Computer Science, Volume 10403, pp. 587–618. Springer, August 2017.
    Original publication at Springer. DOI: 10.1007/978-3-319-63697-9_20. Available as Cryptology ePrint Archive Report 2017/501.
  19. 0-RTT Key Exchange with Full Forward Secrecy [PDF]
    Felix Günther, Britta Hale, Tibor Jager, and Sebastian Lauer
    36th International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2017), Lecture Notes in Computer Science, Volume 10212, pp. 519–548. Springer, April 2017.
    Original publication at Springer. DOI: 10.1007/978-3-319-56617-7_18. Available as Cryptology ePrint Archive Report 2017/223.
    Presented at RWC 2017.
  20. Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates [PDF]
    Marc Fischlin and Felix Günther
    2nd IEEE European Symposium on Security and Privacy (EuroS&P 2017), pp. 60–75. IEEE, April 2017.
    Original publication at IEEE. DOI: 10.1109/EuroSP.2017.18. Available as Cryptology ePrint Archive Report 2017/082.
  21. Secure Logging Schemes and Certificate Transparency [PDF]
    Benjamin Dowling, Felix Günther, Udyani Herath, and Douglas Stebila
    21st European Symposium on Research in Computer Security (ESORICS 2016), Lecture Notes in Computer Science, Volume 9879, pp. 140–158. Springer, September 2016.
    Original publication at Springer. DOI: 10.1007/978-3-319-45741-3_8. Available as Cryptology ePrint Archive Report 2016/452.
  22. Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3 [PDF]
    Marc Fischlin, Felix Günther, Benedikt Schmidt, and Bogdan Warinschi
    37th IEEE Symposium on Security and Privacy (S&P 2016), pp. 452–469. IEEE, May 2016.
    Original publication at IEEE. DOI: 10.1109/SP.2016.34.
  23. A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates [PDF]
    Benjamin Dowling, Marc Fischlin, Felix Günther, and Douglas Stebila
    22nd ACM Conference on Computer and Communications Security (CCS 2015), pp. 1197–1210. ACM, October 2015.
    Original publication at ACM. DOI: 10.1145/2810103.2813653. Available as Cryptology ePrint Archive Report 2015/914.
  24. Data Is a Stream: Security of Stream-Based Channels [PDF]
    Marc Fischlin, Felix Günther, Giorgia Azzurra Marson, and Kenneth G. Paterson
    35th International Cryptology Conference (CRYPTO 2015), Lecture Notes in Computer Science, Volume 9216, pp. 545–564. Springer, August 2015.
    Original publication at Springer. DOI: 10.1007/978-3-662-48000-7_27. Available as Cryptology ePrint Archive Report 2017/1191.
  25. Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes (best student paper award) [PDF]
    Felix Günther and Bertram Poettering
    20th Australasian Conference on Information Security and Privacy (ACISP 2015), Lecture Notes in Computer Science, Volume 9144, pp. 195–212. Springer, June 2015.
    Original publication at Springer. DOI: 10.1007/978-3-319-19962-7_12. Available as Cryptology ePrint Archive Report 2014/014.
  26. Unpicking PLAID – A Cryptographic Analysis of an ISO-standards-track Authentication Protocol [PDF]
    Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, and Kenneth G. Paterson
    1st International Conference on Research in Security Standardisation (SSR 2014), Lecture Notes in Computer Science, Volume 8893, pp. 1–25. Springer, December 2014.
    Original publication at Springer. DOI: 10.1007/978-3-319-14054-4_1. Available as Cryptology ePrint Archive Report 2014/728.
  27. Multi-Stage Key Exchange and the Case of Google's QUIC Protocol [PDF]
    Marc Fischlin and Felix Günther
    21st ACM Conference on Computer and Communications Security (CCS 2014), pp. 1193–1204. ACM, November 2014.
    Original publication at ACM. DOI: 10.1145/2660267.2660308.
  28. Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation [PDF]
    Felix Günther, Mark Manulis, and Andreas Peter
    13th International Conference on Cryptology and Network Security (CANS 2014), Lecture Notes in Computer Science, Volume 8813, pp. 321–336. Springer, October 2014.
    Original publication at Springer. DOI: 10.1007/978-3-319-12280-9_21. Available as Cryptology ePrint Archive Report 2014/382.
  29. Pseudorandom Signatures [PDF]
    Nils Fleischhacker, Felix Günther, Franziskus Kiefer, Mark Manulis, and Bertram Poettering
    8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), pp. 107–118. ACM, May 2013.
    Original publication at ACM. DOI: 10.1145/2484313.2484325. Available as Cryptology ePrint Archive Report 2011/673.
  30. Key Management in Distributed Online Social Networks [PDF]
    Felix Günther, Mark Manulis, and Thorsten Strufe
    12th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2011) / D-SPAN Workshop, pp. 1–7. IEEE, June 2011.
    Original publication at IEEE. DOI: 10.1109/WoWMoM.2011.5986171.
  31. Cryptographic Treatment of Private User Profiles [PDF]
    Felix Günther, Mark Manulis, and Thorsten Strufe
    15th International Conference on Financial Cryptography and Data Security (FC 2011) / RLCPS Workshop, Lecture Notes in Computer Science, Volume 7126, pp. 40–54. Springer, March 2011.
    Original publication at Springer. DOI: 10.1007/978-3-642-29889-9_5. Available as Cryptology ePrint Archive Report 2011/064.

Papers in Workshops without Proceedings

  1. A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol [PDF]
    Benjamin Dowling, Marc Fischlin, Felix Günther, and Douglas Stebila
    Presented at the TRON (TLS1.3 – Ready or Not?) Workshop / NDSS 2016, Februar 2016.
    Available as Cryptology ePrint Archive Report 2016/081.
  2. Efficient Implementation of Code-Based Identification Schemes [PDF]
    Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui, Felix Günther, Gerhard Hoffmann, and Holger Rother
    Technical Report, presented at the Western European Workshop on Research in Cryptology (WEWoRC 2011), July 2011.

Journal Articles by Invitation

  1. Modeling advanced security aspects of key exchange and secure channel protocols [PDF]
    Felix Günther
    it - Information Technology (Distinguished Dissertations). De Gruyter Oldenbourg, 2020. By invitation as finalist for the CAST/German Informatics Society Doctoral Dissertation Award in IT Security.
    Original publication at De Gruyter. DOI: 10.1515/itit-2020-0029.

Books (as Editor)

  1. Security Standardisation Research: 8th International Conference, SSR 2023, Lyon, France, April 22-23, 2023, Proceedings
    Felix Günther and Julia Hesse (Eds.)
    Lecture Notes in Computer Science, Volume 13895. Springer, April 2023.
    Original publication at Springer.

Surveys

  1. Group Signatures: Authentication with Privacy [PDF]
    Mark Manulis, Nils Fleischhacker, Felix Günther, Franziskus Kiefer, and Bertram Poettering
    Survey for the BSI (German Federal Office for Information Security), 2012.

Theses

  1. Modeling Advanced Security Aspects of Key Exchange and Secure Channel Protocols [PDF]
    Felix Günther
    Ph.D. thesis, Technische Universität Darmstadt, Darmstadt, Germany, February 2018.
  2. Privacy-Preserving Participatory Sensing with Data Aggregation [PDF]
    Felix Günther
    Master thesis, Technische Universität Darmstadt, Darmstadt, Germany, March 2013.
  3. Cryptographic Treatment of Private User Profiles [PDF]
    Felix Günther
    Bachelor thesis, Technische Universität Darmstadt, Darmstadt, Germany, November 2010.

Picture of Felix Günther

Dr. Felix Günther
IBM Research Europe – Zurich

Postal address:
Säumerstrasse 4
8803 Rüschlikon
Switzerland

Email:mail[DELETE-THIS]@felixguenther.info
PGP:0x52AF0200D3F1700E

Copyright notice
The documents contained in these directories are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.

Data Protection Declaration / Privacy Policy