Curriculum vitae

I am a senior researcher in cryptography and information security. I received a master’s degree of technical mathematics from Graz University of Technology, Austria in 2005. Subsequently, I became a Ph.D. student at the Institute of Applied Information Processing and Communications (IAIK) at the same university. In 2010, I finished my doctoral dissertation on the analysis of cryptographic hash functions under the supervision of Prof. Vincent Rijmen. Subsequently, I became a postdoctoral research assistant at the Computer Security and Industrial Cryptography group (COSIC) of KU Leuven, Belgium in 2011. In 2012, I returned to IAIK and continued my research activities on the design and analysis of cryptographic primitives. Since 2017 I am working as security architect at Infineon Technologies, Germany.

I am a co-designer of the hash function Grøstl, one of the 5 finalists in the NIST SHA-3 competition, and the authenticated encryption algorithms Ascon and PRIMATEs submitted to the ongoing CAESAR competition.

Editorial board

Program committee member

Conference refereeing

  • 2017: CRYPTO, EUROCRYPT, FSE, ICISSP, IWSEC
  • 2016: ACNS, ARCTICCRYPT, ASIACRYPT, CECC, CRYPTO, EUROCRYPT, FSE, ICISSP, INDOCRYPT, IWSEC, SAC
  • 2015: CRYPTO, EUROCRYPT, FSE, ICISC, ICISSP, INDOCRYPT, INSCRYPT, SAC
  • 2014: ASIACRYPT, CHES, EUROCRYPT, FSE, ICISC, INDOCRYPT, INSCRYPT, INTRUST, ISC, SAC
  • 2013: CRYPTO, EUROCRYPT, FSE, ICISC, INSCRYPT, SAC, WCC
  • 2012: ASIACRYPT, CANS, CT-RSA, CRYPTO, ESORICS, EUROCRYPT, FSE, INSCRYPT, SAC, WEWORC
  • 2011: ACISP, ASIACRYPT, CANS, CRYPTO
  • 2010: ASIACRYPT, FSE, SAC
  • 2009: ASIACRYPT, CT-RSA, FSE
  • 2008: ASIA-CCS, ASIACRYPT, EUROCRYPT, FSE, ICISC, INDOCRYPT, SAC
  • 2007: ASIACRYPT, CT-RSA, FSE, SAC
  • 2006: FSE

Journal refereeing

  • Cryptography and Communications
  • Cryptologia
  • Designs, Codes and Cryptography
  • Discrete Mathematics, Algorithms and Applications
  • Frontiers of Computer Science
  • IEEE Transactions on Information Forensics & Security
  • IEEE Transactions on Information Theory
  • IEICE Transactions on Fundamentals
  • IET Information Security
  • Information Processing Letters
  • International Journal of Applied Cryptography
  • International Journal of Computer Mathematics
  • Journal of Cryptographic Engineering
  • Journal of Cryptology
  • Journal of Logical and Algebraic Methods in Programming
  • Journal on Satisfiability, Boolean Modeling and Computation
  • Journal of Systems and Software
  • The Computer Journal