What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Felix Günther
Google Scholar
37
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/pkc
Security Analysis of Signal's sfPQXDH Handshake.
Rune Fiedler
Felix Günther
2025
conf/eurocrypt
Key Derivation Functions Without a Grain of Salt.
Matilda Backendal
Sebastian Clermont
Marc Fischlin
Felix Günther
2025
conf/crypto
sfXHMQV: Better Efficiency and Stronger Security for Signal's Initial Handshake based on HMQV.
Rune Fiedler
Felix Günther
Jiaxin Pan
Runzhi Zeng
2025
conf/crypto
Verifiable Decapsulation: Recognizing Faulty Implementations of Post-quantum KEMs.
Lewis Glabush
Felix Günther
Kathrin Hövelmanns
Douglas Stebila
2025
conf/crypto
Hybrid Obfuscated Key Exchange and KEMs.
Felix Günther
Michael Rosenberg
Douglas Stebila
Shannon Veitch
2024
journals/joc
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3.
Marc Fischlin
Felix Günther
Christian Janson
2024
conf/ccs
Obfuscated Key Exchange.
Felix Günther
Douglas Stebila
Shannon Veitch
2024
conf/crypto
A Formal Treatment of End-to-End Encrypted Cloud Storage.
Matilda Backendal
Hannah Davis
Felix Günther
Miro Haller
Kenneth G. Paterson
2023
conf/ccs
Verifiable Verification in Cryptographic Protocols.
Marc Fischlin
Felix Günther
2023
conf/crypto
When Messages Are Keys: Is HMAC a Dual-PRF?
Matilda Backendal
Mihir Bellare
Felix Günther
Matteo Scarlata
2023
conf/eurosp
Careful with MAc-then-SIGn: A Computational Analysis of the EDHOC Lightweight Authenticated Key Exchange Protocol.
Felix Günther
Marc Ilunga Tshibumbu Mukendi
2022
conf/acns
KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round Trip.
Felix Günther
Simon Rastikian
Patrick Towa
Thom Wiggers
2022
conf/esorics
Continuous Authentication in Secure Messaging.
Benjamin Dowling
Felix Günther
Alexandre Poirrier
2022
conf/pkc
Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake.
Jacqueline Brendel
Rune Fiedler
Felix Günther
Christian Janson
Douglas Stebila
2022
conf/eurocrypt
On the Concrete Security of TLS 1.3 PSK Mode.
Hannah Davis
Denis Diemert
Felix Günther
Tibor Jager
2022
conf/asiacrypt
Puncturable Key Wrapping and Its Applications.
Matilda Backendal
Felix Günther
Kenneth G. Paterson
2021
journals/joc
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol.
Benjamin Dowling
Marc Fischlin
Felix Günther
Douglas Stebila
2021
conf/ccs
The Security of ChaCha20-Poly1305 in the Multi-User Setting.
Jean Paul Degabriele
Jérôme Govinden
Felix Günther
Kenneth G. Paterson
2021
conf/acns
Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols.
Hannah Davis
Felix Günther
2020
conf/icics
Information-Theoretic Security of Cryptographic Channels.
Marc Fischlin
Felix Günther
Philipp Muth
2020
conf/ctrsa
Modeling Memory Faults in Signature and Authenticated Encryption Schemes.
Marc Fischlin
Felix Günther
2020
conf/eurocrypt
Separate Your Domains: NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability.
Mihir Bellare
Hannah Davis
Felix Günther
2020
conf/sacrypt
Towards Post-Quantum Security for Signal's X3DH Handshake.
Jacqueline Brendel
Marc Fischlin
Felix Günther
Christian Janson
Douglas Stebila
2019
conf/esorics
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids.
Jacqueline Brendel
Marc Fischlin
Felix Günther
2017
conf/crypto
A Formal Treatment of Multi-key Channels.
Felix Günther
Sogol Mazaheri
2017
conf/crypto
PRF-ODH: Relations, Instantiations, and Impossibility Results.
Jacqueline Brendel
Marc Fischlin
Felix Günther
Christian Janson
2017
conf/eurosp
Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates.
Marc Fischlin
Felix Günther
2017
conf/eurocrypt
0-RTT Key Exchange with Full Forward Secrecy.
Felix Günther
Britta Hale
Tibor Jager
Sebastian Lauer
2016
conf/sp
Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3.
Marc Fischlin
Felix Günther
Benedikt Schmidt
Bogdan Warinschi
2016
conf/esorics
Secure Logging Schemes and Certificate Transparency.
Benjamin Dowling
Felix Günther
Udyani Herath
Douglas Stebila
2015
conf/ccs
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates.
Benjamin Dowling
Marc Fischlin
Felix Günther
Douglas Stebila
2015
conf/acisp
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes.
Felix Günther
Bertram Poettering
2015
conf/crypto
Data Is a Stream: Security of Stream-Based Channels.
Marc Fischlin
Felix Günther
Giorgia Azzurra Marson
Kenneth G. Paterson
2014
conf/ccs
Multi-Stage Key Exchange and the Case of Google's QUIC Protocol.
Marc Fischlin
Felix Günther
2014
conf/cans
Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation.
Felix Günther
Mark Manulis
Andreas Peter
2013
conf/ccs
Pseudorandom signatures.
Nils Fleischhacker
Felix Günther
Franziskus Kiefer
Mark Manulis
Bertram Poettering
2011
conf/fc
Cryptographic Treatment of Private User Profiles.
Felix Günther
Mark Manulis
Thorsten Strufe
Coauthors
Alexandre Poirrier
(1)
Andreas Peter
(1)
Benedikt Schmidt
(1)
Benjamin Dowling
(4)
Bertram Poettering
(2)
Bogdan Warinschi
(1)
Britta Hale
(1)
Christian Janson
(4)
Denis Diemert
(1)
Douglas Stebila
(8)
Felix Günther
(37)
Franziskus Kiefer
(1)
Giorgia Azzurra Marson
(1)
Hannah Davis
(4)
Jacqueline Brendel
(4)
Jean Paul Degabriele
(1)
Jérôme Govinden
(1)
Jiaxin Pan
(1)
Kathrin Hövelmanns
(1)
Kenneth G. Paterson
(4)
Lewis Glabush
(1)
Marc Fischlin
(14)
Marc Ilunga Tshibumbu Mukendi
(1)
Mark Manulis
(3)
Matilda Backendal
(4)
Matteo Scarlata
(1)
Michael Rosenberg
(1)
Mihir Bellare
(2)
Miro Haller
(1)
Nils Fleischhacker
(1)
Patrick Towa
(1)
Philipp Muth
(1)
Rune Fiedler
(3)
Runzhi Zeng
(1)
Sebastian Clermont
(1)
Sebastian Lauer
(1)
Shannon Veitch
(2)
Simon Rastikian
(1)
Sogol Mazaheri
(1)
Thom Wiggers
(1)
Thorsten Strufe
(1)
Tibor Jager
(2)
Udyani Herath
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to