I am a senior scientist specializing in the design and analysis of secure communication systems, with a focus on cryptographic protocols and primitives – particularly key exchange, encryption, data access control, and authentication. My most recent work is on advancing hybrid quantum-safe cryptography to achieve long-term security for next-generation communication infrastructures.
I actively contribute to standardization efforts at ETSI and CEN/CENELEC – including my current involvement in ETSI STF 684 (standardizing Quantum-Safe Hybrid Authenticated Key Exchange) and my past role in ETSI STF 529 (standardizing Attribute-Based Access Control).
Academic & professional background
In 2016, I joined the AIT Austrian Institute of Technology, Austria’s largest research and technology organization. Before, I held a postdoctoral position at the Karlsruhe Institute of Technology (KIT) in Germany.
In 2015, I earned my PhD (Dr. rer. nat.) in Cryptography from KIT under the supervision of Prof. Dennis Hofheinz (now at ETH Zurich). My PhD research focused on advanced cryptographic building blocks with an emphasis on security proofs. During my time at KIT, I also contributed to teaching, including Algorithms I (lab, 2015) and IT Security (lab, 2013), as well as seminars and additional lab sessions.
In 2010, I completed my Diploma in Computer Science at the Technical University of Braunschweig, with a focus on cryptography and software engineering. During my studies, I had the opportunity to particpate in an internship with Siemens USA in Princeton, New Jersey (2008).
News & activities
Selected publications (alphabetical ordering of authors if not stated differently by asterisk):
Quantum-Safe Hybrid Key Exchanges with KEM-Based Authentication
*Christopher Battarbee,
Christoph Striecks,
Ludovic Perret,
Sebastian Ramacher,
and Kevin Verhaeghe.
(Q1 SJR Rank) EPJ Quantum Technologies 12, Article number: 128 (2025)
Authenticated Key Exchange (AKE) between any two entities is one of the most important security protocols available for securing our digital networks and infrastructures. In PQCrypto 2023, Bruckner, Ramacher and Striecks proposed a novel hybrid AKE (HAKE) protocol, dubbed Muckle+, that is particularly useful in large quantum-safe networks consisting of a large number of nodes. Their protocol is hybrid in the sense that it allows key material from conventional and post-quantum primitives, as well as from quantum key distribution, to be incorporated into a single end-to-end shared key. To achieve the desired authentication properties, Muckle+ utilizes post-quantum digital signatures. However, available instantiations of such signatures schemes are not yet efficient enough compared to their post-quantum key-encapsulation mechanism (KEM) counterparts, particularly in large networks with potentially several connections in a short period of time. To mitigate this gap, we propose Muckle# that pushes the efficiency boundaries of currently known HAKE constructions. Muckle# uses post-quantum key-encapsulating mechanisms for implicit authentication inspired by recent works done in the area of Transport Layer Security (TLS) protocols, particularly, in KEMTLS (CCS’20). We port those ideas to the HAKE framework and develop novel proof techniques on the way. Due to our novel KEM-based approach, the resulting protocol has a slightly different message flow compared to prior work that we carefully align with the HAKE framework and which makes our changes to the Muckle+ non-trivial.
Versatile Quantum-Safe Hybrid Key Exchange and Its Application to MACsec
*Jaime S. Buruaga,
Augustine Bugler,
Juan P. Brito,
Vicente Martin,
and Christoph Striecks.
(Q1 SJR Rank) EPJ Quantum Technologies 12, Article number: 84 (2025)
Advancements in quantum computing pose a significant threat to most of the cryptography currently deployed. Fortunately, cryptographic building blocks to mitigate the threat are already available; mostly based on post-quantum and quantum cryptography, but also on symmetric cryptography techniques. Notably, quantum-safe building blocks must be deployed as soon as possible due to the “harvest-now decrypt-later” attack scenario, which is already challenging our sensitive and encrypted data today. Following an agile defense-in-depth approach, Hybrid Authenticated Key Exchange (HAKE) protocols have recently been gaining significant attention. Such protocols modularly combine conventional, post-quantum, and quantum cryptography to achieve confidentiality, authenticity, and integrity guarantees for network channels. Unfortunately, only a few protocols have yet been proposed (mainly Muckle and Muckle+) with different flexibility guarantees. Looking at available standards in the network domain (especially at the Media Access Control Security (MACsec) standard), we believe that HAKE protocols could already bring strong security benefits to MACsec today. MACsec is a standard designed to secure communication at the data link layer in Ethernet networks by providing security for all traffic between adjacent entities. In addition, MACsec establishes secure channels within a Local Area Network (LAN), ensuring that data remain protected from eavesdropping, tampering, and unauthorized access, while operating transparently to higher layer protocols. Currently, MACsec does not offer enough protection in the event of cryptographically relevant quantum computers. In this work, we tackle the challenge and propose a new versatile HAKE protocol, dubbed VMuckle, which is sufficiently flexible for the use in MACsec to provide LAN participants with hybrid key material ensuring secure communication.
Muckle+: End-to-End Hybrid Authenticated Key Exchanges
Sonja Bruckner,
Sebastian Ramacher,
and Christoph Striecks.
(C Core Rank) Post-Quantum Cryptography - 14th International Workshop, PQCrypto
2023, College Park, MD, USA, August 16-18, 2023, Proceedings
End-to-end authenticity in public networks plays a significant role. Namely, without authenticity, the adversary might be able to retrieve even confidential information straight away by impersonating others. Proposed solutions to establish an authenticated channel cover pre-shared key-based, password-based, and certificate-based techniques. To add confidentiality to an authenticated channel, authenticated key exchange (AKE) protocols usually have one of the three solutions built in. As an amplification, hybrid AKE (HAKE) approaches are getting more popular nowadays and were presented in several flavors to incorporate classical, post-quantum, or quantum-key-distribution components. The main benefit is redundancy, i.e., if some of the components fail, the primitive still yields a confidential and authenticated channel. However, current HAKE instantiations either rely on pre-shared keys (which yields inefficient end-to-end authenticity) or only support one or two of the three above components (resulting in reduced redundancy and flexibility). In this work, we present an extension of a modular HAKE framework due to Dowling, Brandt Hansen, and Paterson (PQCrypto’20) that does not suffer from the above constraints. While their instantiation, dubbed Muckle, requires pre-shared keys (and hence yields inefficient end-to-end authenticity), our extended instantiation called Muckle+ utilizes post-quantum digital signatures. While replacing pre-shared keys with digital signatures is rather straightforward in general, this turned out to be surprisingly non-trivial when applied to HAKE frameworks (resulting in a significant model change with adapted proof techniques).
Bloom Filter Encryption and Applications to Efficient Forward-Secret
0-RTT Key Exchange
David Derler,
Tibor Jager,
Daniel Slamanig,
and Christoph Striecks.
(A* Core Rank) Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International
Conference on the Theory and Applications of Cryptographic Techniques,
Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III
Forward secrecy is considered an essential design goal of modern key establishment (KE) protocols, such as TLS 1.3, for example. Furthermore, efficiency considerations such as zero round-trip time (0-RTT), where a client is able to send cryptographically protected pay- load data along with the very first KE message, are motivated by the practical demand for secure low-latency communication. For a long time, it was unclear whether protocols that simultaneously achieve 0-RTT and full forward secrecy exist. Only recently, the first forward-secret 0-RTT protocol was described by Günther et al. (Euro- crypt 2017). It is based on Puncturable Encryption. Forward secrecy is achieved by “puncturing” the secret key after each decryption operation, such that a given ciphertext can only be decrypted once (cf. also Green and Miers, S&P 2015). Unfortunately, their scheme is completely impractical, since one puncturing operation takes between 30 seconds and several minutes for reasonable security and deployment parameters, such that this solution is only a first feasibility result, but not efficient enough to be deployed in practice. In this paper, we introduce a new primitive that we term Bloom Filter Encryption (BFE), which is derived from the probabilistic Bloom filter data structure. We describe different constructions of BFE schemes, and show how these yield new puncturable encryption mechanisms with extremely efficient puncturing. Most importantly, a puncturing operation only involves a small number of very efficient computations, plus the deletion of certain parts of the secret key, which outperforms previous constructions by orders of magnitude. This gives rise to the first forward-secret 0-RTT protocols that are efficient enough to be deployed in practice. We believe that BFE will find applications beyond forward- secret 0-RTT protocols.
Organizing activities:
Current projects:
Completed projects:
- QCI-CAT (Digital European Program, 2022-2026)
- PETRUS (Digital European Program, 2022-2025)
- EDOCC (European Defence Fund, 2022-2025)
- TeamAware (EU HORIZON 2020, 2021-2024)
- PROFET (FWF, netidee SCIENCE, 2019-2023)
- COMP4DRONES (EU HORIZON 2020, ECSEL, 2019-2023)
- SECREDAS (EU HORIZON 2020, ECSEL, 2018-2021)
- IoT4CPS (FFG and BMK, ICT of the Future, 2017-2020)
- PRISMACLOUD (EU HORIZON 2020, 2015-2018)
- CREDENTIAL (EU HORIZON 2020, 2015-2018)
Research visits:
Teaching & supervision:
- Teaching: Advanced Public-Key Encryption (invited lecture, WT 2020, TU Vienna), Advanced Public-Key Encryption (invited lecture, WT 2019, TU Vienna), Algorithms I (TA, ST 2015, KIT), Gems of Theoretical Computer Science (ST 2014, KIT), IT security (TA, ST 2013, KIT), Software Development (WTs 2010-2012, KIT), Traitor Tracing (WT 2011, KIT), Identity-Based Encryption (ST 2011, KIT), Practical Cryptography (ST 2011, KIT), Lattice-Based Cryptography (WT 2010, KIT), TA programming and cryptography/IT security (until WT 09, Braunschweig University of Technology)
- PhD visitor: Jaime S. Buruaga (Technical University of Madrid, Jul.-Oct. 2024)
- Master students: Augustine Bugler (University of Vienna, Mar.-Jun. 2026)
- Recent students & interns: Augustine Bugler (University of Vienna, Jul.-Sep. 2024, Mar. 2025 - Feb. 2026), Kevin Verhaeghe (ETH Zurich, Jul.-Sep. 2024), Alexander Zikulnig (TU Vienna, Aug.-Sep. 2022)
Program committees:
- International Conference on Practice and Theory in Public Key Cryptography (PKC) 2027
- International Conference on Quantum Communications, Networking, and Computing (QCNC) 2025, 2024
- International Conference on Cryptology and Network Security (CANS) 2025, 2024, 2023, 2022
- Security Standardisation Research Conference 2024, 2023
- IMA International Conference on Cryptography and Coding 2019
- ICISSP 2025, 2024
- GI SICHERHEIT 2024, 2022 & 2020
- ARES Workshops 2023, 2022 & 2020
- IFIP Summer School on Privacy and Identity Management 2019 & 2018
Selected external reviewing activities:
- CRYPTO 2025, 2024, 2022, 2019
- EUROCRYPT 2023, 2022
- ASIACRYPT 2022, 2021, 2016, 2015
- ACM CCS 2023, 2022, 2020
- ICALP 2022
- PKC 2023, 2020, 2018, 2017, 2016
- IEEE Transactions on Information Forensics and Security 2025, 2022
- IEEE Transactions on Dependable and Secure Computing 2022, 2021