portrait
Máté Horváth
Post-doctoral Researcher
IT Security and Cryptography Group
School of Electrical, Information and Media Engineering
University of Wuppertal
address: Rainer-Gruenter-Str. 21, 42119 Wuppertal, Germany
office: Campus Freudenberg, Buliding FME, Room 2.06
tel: +49 202 439-1086
e-mail: horvath42 (at) uni-2wuppertal (dot) de -- (humans, please remove numbers)
ORCID iD iconhttps://orcid.org/0000-0001-9512-5196
DBLP iconDBLP Profile
google scholar iconGoogle Scholar Profile
MTMT iconMTMT Profile

Máté obtained his MSc diploma in computer science in the Security and Privacy program of EIT ICT Labs (called EIT Digital now) at the University of Trento (Italy) and Eötvös Loránd University (Hungary). His bachelor degree is in mathematics from the Budapest University of Technology and Economics. During his PhD studies, he has been doing research in the CrySyS Lab. under the guidance of Levente Buttyán. He obtained the PhD degree in May, 2021. Currently, he is a post-doctoral researcher hosted by Tibor Jager.

Research interests:

My primary interests are in cryptography, especially in public-key cryptography. I am fascinated by the open questions related to advanced crypto primitives (like various forms of functional encryption), the security of cryptographic protocols in practice and, of course, the intersection of these topics with the need for protection against quantum adversaries.

Some highlights:

  • A joint work with Sebastian Faller, Tobias Handirk, Julia Hesse and Anja Lehmann about the right design of key-backup protocols was peresented at CCS'24
  • Our analysis of WhatsApp's E2EE backup protocol was published at CRYPTO'23 (joint work with Gareth T. Davies, Sebastian Faller, Kai Gellert, Tobias Handirk, Julia Hesse, and Tibor Jager)
  • Our joint work with István András Seres and Péter Burcsi on the Legendre PRF is published in AAECC. Any feedback is welcome!
  • From January 2022, I have started a new job in the ITSC research group of Tibor Jager.
  • I have successfully defended my PhD theses! Thanks for everyone who supported me during this adventurous journey.
  • Obfuscation book cover Our book on the first two generations of cryptographic obfuscation has been published as part of the SpringerBriefs in Computer Science series.
    You can order the softcover or eBook version here.
    For the manuscript click here!

    Almost every book contains errors, and this one will hardly be an exception. Please let me know about any errors you find. I will maintain an errata here.