My research is driven by the question how to mitigate the threat posed by quantum computers to how we communicate sensitive data today. (‘Communicating sensitive data’ = wiring money, logging in to a webpage, exchanging sensitive information like medical data or company/governmental/military secrets, using Whatsapp…) In a bit more detail, my research focuses on cryptographic algorithms that can be used on today’s computers and remain secure even under quantum attacks. (This is also called ‘post-quantum security.) One achievement I’m very exited about is that my research contributed to the theoretical groundwork for Kyber, an emerging NIST standard for public-key encryption.
The methods I use combine techniques from provable security with developing new theoretical tools stemming from quantum information theory. To learn more about my research interests, take a look at my publications and talks page.
Before joining TU/e, I did my PhD in the Cryptology group at Bochum’s gorgeous Ruhr University, under the supervision of Eike Kiltz and partially funded by the Prometheus project. I studied Mathematics at University Duisburg Essen. Before that, I completed a three-year training as mathematical-technical system engineer at RWTH Aachen.
You can also follow me on Twitter using the handle quantum_bat.
Below you find a summary of my service to the cryptographic community so far.
I served as program committee member for SAC’22, CT-RSA’23, and TCHES’24.
I served as referee for Eurocrypt’23, PKC’22, Asiacrypt’21, PQCrypto’21, Crypto’21, Eurocrypt’21, Asiacrypt’20, Crypto’20, Eurocrypt’20, Asiacrypt’19, Crypto’19, Asiacrypt’18.