Felix Günther
Felix Günther
Postdoc, ETH Zurich
Bestätigte E-Mail-Adresse bei inf.ethz.ch - Startseite
Zitiert von
Zitiert von
A cryptographic analysis of the TLS 1.3 handshake protocol candidates
B Dowling, M Fischlin, F Günther, D Stebila
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Multi-stage key exchange and the case of Google's QUIC protocol
M Fischlin, F Günther
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
CogniCrypt: supporting developers in using cryptography
S Krüger, S Nadi, M Reif, K Ali, M Mezini, E Bodden, F Göpfert, F Günther, ...
2017 32nd IEEE/ACM International Conference on Automated Software …, 2017
Secure logging schemes and Certificate Transparency
B Dowling, F Günther, U Herath, D Stebila
European Symposium on Research in Computer Security, 140-158, 2016
0-RTT Key Exchange with Full Forward Secrecy
F Günther, B Hale, T Jager, S Lauer
Annual International Conference on the Theory and Applications of …, 2017
Data is a stream: security of stream-based channels
M Fischlin, F Günther, GA Marson, KG Paterson
Annual Cryptology Conference, 545-564, 2015
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol.
B Dowling, M Fischlin, F Günther, D Stebila
IACR Cryptol. ePrint Arch. 2016, 81, 2016
Key confirmation in key exchange: A formal treatment and implications for TLS 1.3
M Fischlin, F Günther, B Schmidt, B Warinschi
2016 IEEE Symposium on Security and Privacy (SP), 452-469, 2016
Group Signatures: Authentication with Privacy
M Manulis, N Fleischhacker, F Günther, F Kiefer, B Poettrering
Bundesamt fur Sicherheit in der Informationstechnik, Bonn, Germany, Tech. Rep, 2012
Replay attacks on zero round-trip time: The case of the TLS 1.3 handshake candidates
M Fischlin, F Günther
2017 IEEE European Symposium on Security and Privacy. IEEE, 2017
Cryptographic treatment of private user profiles
F Günther, M Manulis, T Strufe
Financial Cryptography and Data Security / RLCPS Workshop, 40-54, 2011
Cryptographic Treatment of Private User Profiles
F Günther
Technische Universität Darmstadt, 2010
PRF-ODH: Relations, Instantiations, and Impossibility Results
J Brendel, M Fischlin, F Günther, C Janson
Annual International Cryptology Conference, 651-681, 2017
A Formal Treatment of Multi-key Channels
F Günther, S Mazaheri
Annual International Cryptology Conference, 587-618, 2017
Privacy-enhanced participatory sensing with collusion resistance and data aggregation
F Günther, M Manulis, A Peter
International Conference on Cryptology and Network Security, 321-336, 2014
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol
JP Degabriele, V Fehr, M Fischlin, T Gagliardoni, F Günther, GA Marson, ...
International Journal of Information Security 15 (6), 637-657, 2016
Unpicking PLAID – A Cryptographic Analysis of an ISO-Standards-Track Authentication Protocol
JP Degabriele, V Fehr, M Fischlin, T Gagliardoni, F Günther, GA Marson, ...
International Conference on Research in Security Standardisation, 1-25, 2014
Key management in distributed online social networks
F Günther, M Manulis, T Strufe
2011 IEEE International Symposium on a World of Wireless, Mobile and …, 2011
Modeling Advanced Security Aspects of Key Exchange and Secure Channel Protocols
F Günther
Technische Universität, 2018
The Status of Quantum-Key-Distribution-Based Long-Term Secure Internet Communication
M Geihs, O Nikiforov, D Demirel, A Sauer, D Butin, F Günther, G Alber, ...
IEEE Transactions on Sustainable Computing, 2019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20