International Association for Cryptologic Research

Ph.D. Database

The aim of the IACR Ph.D. database is twofold. On the first hand, we want to offer an overview of Ph.D. already completed in the domain of cryptology. Where possible, this should also include a subject classification, an abstract, and access to the full text. On the second hand, it deals with Ph.D. subjects currently under investigation. This way, we provide a timely map of contemporary research in cryptology. All entries or changes need to be approved by an editor. You can contact them via phds (at)

You can add a new Ph.D. thesis here. Most entries (e.g. full text) can be added later. All entries can also be changed later.


  • Quicksearch
  • Search by name, institution, category, keywords or title of Ph.D. thesis
  • Extended Search

Latest 30 entries of 469 entries

show allSort by name year update Read as: Name (Institution that granted Ph.D.), Title of Thesis (category) - last change to database

Behrooz khadem ( - A Chaotic Self-Synchronizing Stream Cipher and Its Application in Image Encryption 2016-01-29
Michael R. Clark (Air Force Institute of Technology, United States of America) - The Theory and Application of Privacy-Preserving Computation (cryptographic protocols) 2016-01-22
Keisuke Tanaka - 2016-01-22
Luk Bettale (University Pierre & Marie Curie, France) - Algebraic Cryptanalysis: Tools and Applications (applications) 2016-01-22
Seungjoo Kim (Sungkyunkwan University, South Korea) - Improved privacy and authenticity in digital signatures / key management (cryptographic protocols) 2016-01-22
Martin Vuagnoux (Ecole Polytechnique Fédérale de Lausanne, Switzerland) - Computer Aided Cryptanalysis from Ciphers to Side Channels (cryptographic protocols) 2016-01-22
Nizamud Din (Hazara University Mansehra, Pakistan) - Design and Analysis of Multi Receiver Signcryption Schemes on Elliptic Curves (public-key cryptography) 2016-01-22
Serge Vaudenay - 2015-12-20
Janaka Alawatugoda (Queensland University of Technology, Australia) - On the leakage resilience of secure channel establishment (public-key cryptography) 2015-12-17
Alireza Jolfaei (Griffith University) - Robust Encryption Schemes for 3D Content Protection (applications) 2015-12-17
Mario Larangeira (Tokyo Institute of Technology) - Programmable and Non-programmable Models in Security Proofs (public-key cryptography) 2015-12-17
Saqib A. Kakvi (Ruhr University Bochum, Germany) - On the Improvement of Security Proofs: Bridging the Gap between Theory and Practice (foundations) 2015-09-30
Dr. Ratna Dutta (Indian Statistical Institute, Kolkata, India, INDIA) - Studies on Pairing-Based and Constant Round Dynamic Group Key Agreement Protocols 2015-07-28
Dr. Y. Sreenivasa Rao - Design and Analysis of Attribute-Based Cryptosystems using Bilinear Pairings (public-key cryptography) 2015-07-28
Filipe Beato (Katholieke Universiteit Leuven, Belgium) - Private Information Sharing in Online communities (cryptographic protocols) 2015-06-19
Nishant Doshi - Investigating Approaches for Improving the Ciphertext Policy Attribute Based Encryption (public-key cryptography) 2015-06-04
Dai Yamamoto (The University of Electro-Communications, Japan) - Security Evaluation and Improvement of Physically Unclonable Functions (implementation) 2015-06-04
Liam Keliher - Linear Cryptanalysis of Substitution-Permutation Networks (secret-key cryptography) 2015-05-09
Damien Vergnaud - 2015-05-04
Aurore Guillevic (Ecole Normale Supérieure, France) - Arithmetic of pairings on algebraic curves for cryptography (public-key cryptography) 2015-05-04
Pablo Rauzy (Télécom ParisTech (Paris, France)) - Formal Software Methods for Cryptosystems Implementation Security (implementation) 2015-04-07
Hadi Soleimany (Aalto University School of Science, Finland) - Studies in Lightweight Cryptography (secret-key cryptography) 2015-04-07
Juraj Šarinay (Ecole Polytechnique Fédérale de Lausanne, Switzerland) - Cryptographic Hash Functions in Groups and Provable Properties 2015-04-07
Przemyslaw Sokolowski (Macquarie University, Australia) - Contributions to cryptanalysis: design and analysis of cryptographic hash functions (secret-key cryptography) 2015-02-22
Benjamin Fuller (Boston University, USA) - Strong Key Derivation from Noisy Sources (foundations) 2015-01-30
Jian Guo (Nanyang Technological University, Singapore) - Analysis of Cryptographic Hash Functions (secret-key cryptography) 2015-01-30
Pascal Junod (Ecole Polytechnique Fédérale de Lausanne, Switzerland) - Statistical cryptanalysis of block ciphers (secret-key cryptography) 2014-12-25
Serge Vaudenay (University of Paris 7 - Denis Diderot, France) - The Security of Cryptographic Primitives (secret-key cryptography) 2014-12-25
Ludovic Perret (Marne-la-Vallée university) - Algebraic and Combinatorial Tools for Public Key Cryptography (public-key cryptography) 2014-12-25
Olivier Billet (University of Versailles, France) - Cryptologie multivariable 2014-12-22

Contact: phds (at)

[ IACR home page ] [ IACR PhDs page ] © IACR