Felix Günther

Welcome

I am a Ph.D. candidate in Computer Science at Technische Universität Darmstadt, Germany, and a member of Prof. Dr. Marc Fischlin's group Cryptography and Complexity Theory (Cryptoplexity). I am a member of the Collaborative Research Center CROSSING at TU Darmstadt. I am a member of the IACR.

Research Interests

I am interested in applied cryptography and computer security, with a particular focus on provable security and interest in narrowing the gap between the theoretical understanding and practical security of real-world cryptographic systems. In my work so far I especially investigated the provable security of (Internet) cryptographic protocols for key exchange and secure channels. More broadly, I studied the privacy and security of cryptographic protocols, privacy-preserving cryptography (incl. homomorphic encryption, key management, and signatures), and cryptographic security in online social networks.

Education

since 2013Ph.D. candidate in Computer Science at TU Darmstadt
2010-2013M.Sc. in Computer Science, TU Darmstadt (With Honors)
2010-2013M.Sc. in IT Security, TU Darmstadt (With Honors)
2007-2010B.Sc. in Computer Science, TU Darmstadt (With Honors)

Awards and Honors

2015Best Student Paper award at ACISP 2015
2011Laureate of the CAST Award IT Security (CAST-Förderpreis IT-Sicherheit): 2nd prize in the category "Bachelor and Study Theses" for my bachelor thesis "Cryptographic Treatment of Private User Profiles"
2007-2013Scholarship from the German National Academic Foundation (Studienstiftung des deutschen Volkes)

Publications

By type, most recent first. Authorship, as common in the crypto community, in alphabetical order.
(See also: dblp, Google Scholar)

Journal Articles

  • Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes
    Felix Günther and Bertram Poettering
    International Journal of Information Security (IJIS), 16(3):281–297. Springer, 2017.
    The original publication is available at Springer.
  • Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol
    Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, and Kenneth G. Paterson
    International Journal of Information Security (IJIS), 15(6):637–657. Springer, 2016.
    The original publication is available at Springer.

Papers in Conferences and Workshops with Proceedings

  • PRF-ODH: Relations, Instantiations, and Impossibility Results (to appear)
    Jacqueline Brendel, Marc Fischlin, Felix Günther, and Christian Janson
    37th International Cryptology Conference (CRYPTO 2017), Lecture Notes in Computer Science, Volume ?????, pp. ???–???. Springer, August 2017.
  • A Formal Treatment of Multi-key Channels (to appear)
    Felix Günther and Sogol Mazaheri
    37th International Cryptology Conference (CRYPTO 2017), Lecture Notes in Computer Science, Volume ?????, pp. ???–???. Springer, August 2017.
  • 0-RTT Key Exchange with Full Forward Secrecy [PDF]
    Felix Günther, Britta Hale, Tibor Jager, and Sebastian Lauer
    36th International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2017), Lecture Notes in Computer Science, Volume 10212, pp. 519–548. Springer, April 2017.
    The original publication is available at Springer.
  • Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates (to appear) [PDF]
    Marc Fischlin and Felix Günther
    2nd IEEE European Symposium on Security and Privacy (EuroS&P 2017). IEEE, April 2017.
  • Secure Logging Schemes and Certificate Transparency [PDF]
    Benjamin Dowling, Felix Günther, Udyani Herath, and Douglas Stebila
    21st European Symposium on Research in Computer Security (ESORICS 2016), Lecture Notes in Computer Science, Volume 9879, pp. 140–158. Springer, September 2016.
    The original publication is available at Springer.
  • Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3
    Marc Fischlin, Felix Günther, Benedikt Schmidt, and Bogdan Warinschi
    37th IEEE Symposium on Security and Privacy (S&P 2016), pp. 452–469. IEEE, May 2016.
    The original publication is available at IEEE.
  • A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates [PDF]
    Benjamin Dowling, Marc Fischlin, Felix Günther, and Douglas Stebila
    22nd ACM Conference on Computer and Communications Security (CCS 2015), pp. 1197–1210. ACM, October 2015.
    The original publication is available at ACM.
  • Data Is a Stream: Security of Stream-Based Channels
    Marc Fischlin, Felix Günther, Giorgia Azzurra Marson, and Kenneth G. Paterson
    35th International Cryptology Conference (CRYPTO 2015), Lecture Notes in Computer Science, Volume 9216, pp. 545–564. Springer, August 2015.
    The original publication is available at Springer.
  • Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes (best student paper) [PDF]
    Felix Günther and Bertram Poettering
    20th Australasian Conference on Information Security and Privacy (ACISP 2015), Lecture Notes in Computer Science, Volume 9144, pp. 195–212. Springer, June 2015.
    The original publication is available at Springer.
  • Unpicking PLAID – A Cryptographic Analysis of an ISO-standards-track Authentication Protocol [PDF]
    Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, and Kenneth G. Paterson
    1st International Conference on Research in Security Standardisation (SSR 2014), Lecture Notes in Computer Science, Volume 8893, pp. 1–25. Springer, December 2014.
    The original publication is available at Springer.
  • Multi-Stage Key Exchange and the Case of Google's QUIC Protocol [PDF]
    Marc Fischlin and Felix Günther
    21st ACM Conference on Computer and Communications Security (CCS 2014), pp. 1193–1204. ACM, November 2014.
    The original publication is available at ACM.
  • Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation [PDF]
    Felix Günther, Mark Manulis, and Andreas Peter
    13th International Conference on Cryptology and Network Security (CANS 2014), Lecture Notes in Computer Science, Volume 8813, pp. 321–336. Springer, October 2014.
    The original publication is available at Springer.
  • Pseudorandom Signatures [PDF] [Full Version PDF]
    Nils Fleischhacker, Felix Günther, Franziskus Kiefer, Mark Manulis, and Bertram Poettering
    8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), pp. 107–118. ACM, May 2013.
    The original publication is available at ACM.
  • Key Management in Distributed Online Social Networks [PDF]
    Felix Günther, Mark Manulis, and Thorsten Strufe
    12th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2011) / D-SPAN Workshop, pp. 1–7. IEEE, June 2011.
    The original publication is available at IEEE.
  • Cryptographic Treatment of Private User Profiles [PDF] [Full Version PDF]
    Felix Günther, Mark Manulis, and Thorsten Strufe
    15th International Conference on Financial Cryptography and Data Security (FC 2011) / RLCPS Workshop, Lecture Notes in Computer Science, Volume 7126, pp. 40–54. Springer, March 2011.
    The original publication is available at Springer.

Papers in Workshops without Proceedings

  • A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol [PDF]
    Benjamin Dowling, Marc Fischlin, Felix Günther, and Douglas Stebila
    IACR Cryptology ePrint Archive 2016/081, January 2016.
    Presented at the TRON (TLS1.3 – Ready or Not?) Workshop / NDSS 2016, Februar 2016.
  • Efficient Implementation of Code-Based Identification Schemes [PDF]
    Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui, Felix Günther, Gerhard Hoffmann, and Holger Rother
    Technical Report, presented at the Western European Workshop on Research in Cryptology (WEWoRC 2011), July 2011.

Surveys

  • Group Signatures: Authentication with Privacy [PDF]
    Mark Manulis, Nils Fleischhacker, Felix Günther, Franziskus Kiefer, and Bertram Poettering
    Survey for the BSI (German Federal Office for Information Security), 2012.

Theses

  • Privacy-Preserving Participatory Sensing with Data Aggregation [PDF]
    Felix Günther
    Master Thesis, March 2013.
  • Cryptographic Treatment of Private User Profiles [PDF]
    Felix Günther
    Bachelor Thesis, November 2010.

Talks

Invited Talks (to Workshops, Seminars, ...)

Talks at Conferences, Workshops, Seminars, ...

  • Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates [PDF]
    April 26, 2017 at EuroS&P 2017 (Paris, France).
  • 0-RTT Key Exchange with Full Forward Secrecy [PDF]
    January 5, 2017 at RWC 2017 (New York City, NY, USA).
  • Secure Logging Schemes and Certificate Transparency [PDF]
    September 29, 2016 at ESORICS 2016 (Heraklion, Crete, Greece).
  • Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3 [PDF]
    May 24, 2016 at IEEE S&P 2016 (San Jose, CA, USA).
  • Establishing Secure Connections: A Cryptographer's Perspective and the Case of TLS 1.3 [PDF]
    April 14, 2016 at CROSSING Seminar, Technische Universität Darmstadt (Darmstadt, Germany).
  • A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol [PDF]
    February 21, 2016 at TRON (TLS1.3 – Ready or Not?) Workshop / NDSS 2016 (San Diego, CA, USA).
  • A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates [PDF]
    October 15, 2015 at ACM CCS 2015 (Denver, CO, USA).
  • Data Is a Stream: Security of Stream-Based Channels [PDF]
    August 19, 2015 at CRYPTO 2015 (Santa Barbara, CA, USA).
  • Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes [PDF]
    June 30, 2015 at ACISP 2015 (Brisbane, Australia).
  • Data Is a Stream: Security of Stream-Based Channels [PDF]
    June 26, 2015 at the Cryptography Reading Group, Information Security Discipline, Queensland University of Technology (Brisbane, Australia).
  • Multi-Stage Key Exchange and the Case of Google's QUIC Protocol [PDF]
    November 6, 2014 at CCS 2014 (Scottsdale, Arizona, USA).
  • Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation [PDF]
    October 24, 2014 at CANS 2014 (Heraklion, Crete, Greece).
  • Pseudorandom Signatures – Relations among Privacy Notions for Digital Signatures [PDF]
    May 8, 2013 at ASIACCS 2013 (Hangzhou, China).
  • Cryptographic Treatment of Private User Profiles (in German) [PDF]
    November 24, 2011 at CAST Workshop "CAST Award IT Security 2011" (Darmstadt, Germany).
  • Key Management in Distributed Online Social Networks [PDF]
    June 20, 2011 at D-SPAN Workshop / WoWMoM 2011 (Lucca, Italy).

Professional Activities

Feb-Dec 2011Collaboration in the project "Group Signatures: Privacy-Preserving Authentication Methods", a survey for the BSI (German Federal Office for Information Security), of the Cryptographic Protocols Group at TU Darmstadt
The resulting survey can be found at www.bsi.bund.de.

Research Visits

Mar 2017 UC San Diego, La Jolla, CA, USA – Security and Cryptography Group
Host: Prof. Mihir Bellare
Feb 2017 Stanford University, Stanford, CA, USA – Applied Cryptography Group
Host: Prof. Dan Boneh
Jan 2017 Cornell Tech University, New York City, NY, USA – Security Group
Host: Prof. Thomas Ristenpart
Johns Hopkins University, Baltimore, MD, USA – Information Security Institute
Host: Prof. Matthew D. Green
IBM T.J. Watson Research Center, Yorktown Heights, NY, USA – Cryptography Research Group
Host: Dr. Hugo Krawczyk
Apr 2016 Ruhr-Universität Bochum, Bochum, Germany – Lehrstuhl für Netz- und Datensicherheit
Hosts: Prof. Dr. Jörg Schwenk and Dr. Tibor Jager
Jun-Jul 2015 Queensland University of Technology, Brisbane, Australia – Information Security Discipline
Host: Senior Lecturer Dr. Douglas Stebila
May 2015 Technische Universität Dresden, Dresden, Germany – Lehrstuhl für Datenschutz und Datensicherheit
Host: Prof. Dr. Thorsten Strufe
Jan 2015 Royal Holloway, University of London, Egham, UK – Information Security Group
Host: Prof. Kenneth G. Paterson

Peer Reviewing for Scientific Conferences and Journals

  • 2017: EUROCRYPT, PKC, ACISP
  • 2016: CRYPTO
  • 2015: Latincrypt, ACM CCS
  • 2014: INFOCOM, TCC, ACNS, ASIACRYPT, Elsevier Information Processing Letters
  • 2013: Elsevier Computer Communications Journal

Research Impact and Media Attention

Teaching

Technische Universität Darmstadt

  • summer term 2017: Teaching assistant for the lecture Real World Crypto by Marc Fischlin
  • winter term 2016/2017: Teaching assistant for the research seminar Research-Oriented Cryptography by Marc Fischlin
  • winter term 2015/2016: Teaching assistant for the lecture Functional and Object-oriented Programming Concepts (Funktionale und objektorientierte Programmierkonzepte, ex. Grundlagen der Informatik 1) by Marc Fischlin
  • winter term 2013/2014: Teaching assistant for the lecture Introduction to Computer Science 1 (Grundlagen der Informatik 1) by Marc Fischlin
  • winter term 2011/2012: Teaching assistant (tutor) for the lecture Introduction to Cryptography (Einführung in die Kryptographie) by Marc Fischlin

Copyright notice
The documents contained in these directories are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.

Felix Günther

Felix Günther, M.Sc. M.Sc.

Technische Universität Darmstadt
Department of Computer Science
Cryptography and Complexity Theory Group
Mornewegstrasse 30
64293 Darmstadt
Germany

Office:S4|14 4.3.21
Phone:+49 6151 16 25733
Email:guenther[DELETE-THIS]@cs.tu-darmstadt.de
PGP:0x52AF0200D3F1700E

Cryptoplexity
Technische Universität Darmstadt
CROSSING