Follow
Felix Günther
Felix Günther
IBM Research - Zurich
Verified email at zurich.ibm.com - Homepage
Title
Cited by
Cited by
Year
A cryptographic analysis of the TLS 1.3 handshake protocol candidates
B Dowling, M Fischlin, F Günther, D Stebila
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1722015
CogniCrypt: supporting developers in using cryptography
S Krüger, S Nadi, M Reif, K Ali, M Mezini, E Bodden, F Göpfert, F Günther, ...
2017 32nd IEEE/ACM International Conference on Automated Software …, 2017
1442017
Multi-stage key exchange and the case of Google's QUIC protocol
M Fischlin, F Günther
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1432014
0-RTT key exchange with full forward secrecy
F Günther, B Hale, T Jager, S Lauer
Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017
1112017
A cryptographic analysis of the TLS 1.3 handshake protocol
B Dowling, M Fischlin, F Günther, D Stebila
Journal of Cryptology 34 (4), 1-69, 2021
912021
Replay attacks on zero round-trip time: The case of the TLS 1.3 handshake candidates
M Fischlin, F Günther
2017 IEEE European Symposium on Security and Privacy. IEEE, 2017
782017
Secure logging schemes and certificate transparency
B Dowling, F Günther, U Herath, D Stebila
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
742016
PRF-ODH: Relations, instantiations, and impossibility results
J Brendel, M Fischlin, F Günther, C Janson
Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017
722017
Key confirmation in key exchange: A formal treatment and implications for TLS 1.3
M Fischlin, F Günther, B Schmidt, B Warinschi
2016 IEEE Symposium on Security and Privacy (SP), 452-469, 2016
652016
A cryptographic analysis of the TLS 1.3 draft-10 full and pre-shared key handshake protocol
B Dowling, M Fischlin, F Günther, D Stebila
Cryptology ePrint Archive, 2016
552016
Data is a stream: Security of stream-based channels
M Fischlin, F Günther, GA Marson, KG Paterson
Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015
552015
Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake
J Brendel, R Fiedler, F Günther, C Janson, D Stebila
Cryptology ePrint Archive, Report 2021/769. https://eprint. iacr. org/2021/769, 2021
542021
Towards post-quantum security for signal’s X3DH handshake
J Brendel, M Fischlin, F Günther, C Janson, D Stebila
Selected Areas in Cryptography: 27th International Conference, Halifax, NS …, 2021
462021
Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols
H Davis, F Günther
Cryptology ePrint Archive, Report 2020/1029. https://eprint.iacr.org/2020/1029, 2020
422020
Separate Your Domains: NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability
M Bellare, H Davis, F Günther
EUROCRYPT 2020, 2020
382020
Group Signatures: Authentication with Privacy
M Manulis, N Fleischhacker, F Günther, F Kiefer, B Poettrering
Bundesamt fur Sicherheit in der Informationstechnik, Bonn, Germany, Tech. Rep, 2012
372012
The status of quantum-key-distribution-based long-term secure internet communication
M Geihs, O Nikiforov, D Demirel, A Sauer, D Butin, F Günther, G Alber, ...
IEEE Transactions on Sustainable Computing 6 (1), 19-29, 2019
332019
Privacy-enhanced participatory sensing with collusion resistance and data aggregation
F Günther, M Manulis, A Peter
Cryptology and Network Security: 13th International Conference, CANS 2014 …, 2014
312014
Cryptographic treatment of private user profiles
F Günther, M Manulis, T Strufe
Financial Cryptography and Data Security / RLCPS Workshop, 40-54, 2011
262011
A formal treatment of multi-key channels
F Günther, S Mazaheri
Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017
222017
The system can't perform the operation now. Try again later.
Articles 1–20