About Me

I am an experienced researcher for applied and theoretical cryptography. I am currently an Assistant Professor for Cryptography at Ruhr University Bochum. Before moving to Bochum I was a postdoctoral fellow at Johns Hopkins University and Carnegie Mellon University working with Abhishek Jain and Vipul Goyal. In February 2017, I received my PhD in Computer Science from Saarland University, where I was advised by Dominique Schröder. During my PhD I was a research intern at Microsoft Research with Chris Brzuska. I was also a research visitor at University of Maryland, College Park with Jonathan Katz and Dana Dachman-Soled.


Publications

Jackpot: Non-Interactive Aggregatable Lotteries
30th Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2024), 2024
Extractable Witness Encryption for KZG Commitments and Efficient Laconic OT
30th Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2024), 2024
Invertible Bloom Lookup Tables With Less Memory and Randomness
32nd Annual European Symposium on Algorithms (ESA 2024), 2024
Chipmunk: Better Synchronized Multi Signatures From Lattices
2023 ACM SIGSAC Conference on Computer and Communications Security (CCS 2023), 2023
Interactive Non Malleable Codes Against Desynchronizing Attacks in the Multi Party Setting
4th Conference on Information-Theoretic Cryptography (ITC 2023), 2023
How to Compress Encrypted Data
42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2023), 2023
Squirrel: Efficient Synchronized Multi Signatures From Lattices
2022 ACM SIGSAC Conference on Computer and Communications (CCS 2022), 2022
Steganography Free Zero Knowledge
The 20th Theory of Cryptography Conference (TCC 2022), 2022
Property Preserving Hash Functions for Hamming Distance From Standard Assumptions
41st Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2022), 2022
Robust Property Preserving Hash Functions for Hamming Distance and More
40th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2021), 2021
On Publicly-Accountable Zero-Knowledge and Small Shuffle Arguments
24th IACR International Conference on Practice and Theory of Public Key Cryptography (PKC 2021), 2021
Feasibility and Infeasibility of Secure Computation With Malicious PUFs
Journal of Cryptology, 2020
Interactive Non-Malleable Codes
The 17th Theory of Cryptography Conference (TCC 2019), 2019
Arithmetic Garbling from Bilinear Maps
24th European Symposium on Research in Computer Security (ESORICS 2019), 2019
On Tight Security Proofs for Schnorr Signatures
Journal of Cryptology, 2019
On the Existence of Three Round Zero Knowledge Proofs
37th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2018), 2018
Efficient Unlinkable Sanitizable Signatures From Signatures With Re-Randomizable Keys
IET Information Security, Volume 12, Issue 3, 2018
Minimal Assumptions in Cryptography
PhD Thesis, Saarland University, 2017
Efficient Cryptographic Password Hardening Services From Partially Oblivious Commitments
2016 ACM SIGSAC Conference on Computer and Communications Security (CCS 2016), 2016
On Statistically Secure Obfuscation With Approximate Correctness
36th International Cryptology Conference (CRYPTO 2016), 2016
Two Message Oblivious Evaluation of Cryptographic Functionalities
36th International Cryptology Conference (CRYPTO 2016), 2016
Efficient Unlinkable Sanitizable Signatures From Signatures With Re-Randomizable Keys
19th International Conference on the Theory and Practice of Public-Key Cryptography (PKC 2016), 2016
A Framework for Multi Factor Authentication and Key Exchange
1st International Conference on Research in Security Standardisation (SSR 2014), 2014
On Tight Security Proofs for Schnorr Signatures
20th Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2014), 2014
Feasibility and Infeasibility of Secure Computation With Malicious PUFs
34th International Cryptology Conference (CRYPTO 2014), 2014
Limitations of the Meta Reduction Technique: The Case of Schnorr Signatures
32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2013), 2013
Pseudorandom Signatures
8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), 2013
Limitations of the Meta Reduction Technique: The Case of Schnorr Signatures
Master Thesis, Technische Universität Darmstadt, 2012
Group Signatures: Authentication With Privacy
Survey for the Federal Office for Information Security, Germany, 2012
SDF - Solar-Aware Distributed Flow in Wireless Sensor Networks
36th IEEE Conference on Local Computer Networks (LCN 2011), 2011
Distributed Flow in Solar Powered Sensor Networks
Bachelor Thesis, Technische Universität Darmstadt, 2010

Miscellaneous

I am the author of the LaTeX package tikzpeople that provides peo­ple-shaped nodes for TikZ. These may be useful in LaTeX beamer presentations or even your papers if you are so inclined.

In my spare time I enjoy long distance running. My current PBs are 43:01 (10k), 1:34:20 (Half Marathon), and 3:18:44 (Marathon).


Contact