About me

I am a PhD student at the Institute of Applied Information Processing and Communications (IAIK) in Graz, Austria and received my Dipl. Ing (MSc) in Computer Science at Graz University of Technology with focus on IT Security. My research interests include practical aspects of information security such as constructing and attacking cryptographic implementations as well as more theoretic aspects such as designing cryptographic schemes that feature robustness against physical attacks in addition to cryptanalytic security. I co-designed ISAP, a lightweight authenticated encryption scheme that is currently competing in the final round of the NIST standardization process of lightweight cryptography and gives out-of-the-box strong guarantees against various kinds of physical attacks like fault injection and power analysis.

Selected publications

  • Secure and Efficient Software Masking on Superscalar Pipelined Processors (pdf)
  • Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber (pdf)
  • Proving SIFA Protection of Masked Redundant Circuits (pdf)
  • Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs (pdf)
  • Protecting against Statistical Ineffective Fault Attacks (pdf)

Recent talks

  • 2020/10/21: On Implementation Security and ISAP v2.0
    @ NIST Lightweight Cryptography Workshop 2020
  • 2020/09/18: Protecting against Statistical Ineffective Fault Attacks
    @ CHES 2020
  • 2020/06/05: Single-Trace Attacks on Keccak
    @ Remote Lunchtalk, Radboud University, Netherlands


I currently teach a graduate course that focuses on implementing, as well as attacking cryptographic implementations. The hardware part of this course covers power analysis (DPA/SPA), fault attacks (DFA/SIFA), and corresponding countermeasure techniques. Students receive real hardware for conducting all these experiments.

Program committee member

Conference refereeing

  • 2018: AFRICACRYPT, CHES, EuroS&P

Journal refereeing

  • Cryptography and Communications Discrete Structures, Boolean Functions and Sequences (CCDS)
  • IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD)
  • Microprocessors and Microsystems: Embedded Hardware Design (MICPRO)
  • IEEE Transactions on Information Forensics & Security (TIFS)
  • The Computer Journal