International Association for Cryptologic Research

Ph.D. Database

The aim of the IACR Ph.D. database is twofold. On the first hand, we want to offer an overview of Ph.D. already completed in the domain of cryptology. Where possible, this should also include a subject classification, an abstract, and access to the full text. On the second hand, it deals with Ph.D. subjects currently under investigation. This way, we provide a timely map of contemporary research in cryptology. All entries or changes need to be approved by an editor. You can contact them via phds (at) iacr.org.

You can add a new Ph.D. thesis here. Most entries (e.g. full text) can be added later. All entries can also be changed later.

Search

  • Quicksearch
  • Search by name, institution, category, keywords or title of Ph.D. thesis
  • Extended Search

Latest 30 entries of 451 entries

show allSort by name year update Read as: Name (Institution that granted Ph.D.), Title of Thesis (category) - last change to database

Paul Camion - 2014-12-20
Khaled Ouafi (Ecole Polytechnique Fédérale de Lausanne, Switzerland) - Security and Privacy in RFID Systems (cryptographic protocols) 2014-12-20
Olivier Billet (University of Versailles, France) - Multivariate cryptology 2014-12-20
Serge Vaudenay (University of Paris 7 - Denis Diderot, France) - The Security of Cryptographic Primitives (secret-key cryptography) 2014-12-20
Jacques Patarin (Université Paris 6) - Étude des générateurs de permutations pseudo-aléatoires basés sur le schéma du D.E.S. (secret-key cryptography) 2014-12-20
Vijayakrishnan Pasupathinathan (Macquarie University, Australia) - Hardware-based Identification and Authentication Systems (applications) 2014-12-17
Josef Pieprzyk - 2014-12-17
Mike Rosulek (University of Illinois, United States of America) - The Structure of Secure Multi-Party Computation (foundations) 2014-12-17
Sareh Emami (Macquarie University, Australia) - Security Analysis of Cryptographic Algorithms (secret-key cryptography) 2014-12-15
Huaxiong Wang - 2014-12-15
Anderson C. A. Nascimento (University of Tokyo) - Bounds and Constructions for Mutually Distrustful Information Theoretically Secure Cryptographic Protocols (foundations) 2014-12-15
Hideki Imai - 2014-12-15
Christophe Tartary (Macquarie University, Australia) - Authentication for Multicast Authentication (cryptographic protocols) 2014-12-15
Md Mokammel Haque (Macquarie University, Australia) - Lattice-based Cryptanalysis for Secure Cryptosystems (applications) 2014-12-10
Miklos Santha - 2014-12-10
Henri Gilbert (University Paris 11 - Orsay) - Cryptanalyse des algorithmes de chiffrement symétrique (secret-key cryptography) 2014-12-10
Hassan Jameel Asghar (Macquarie University, Australia) - Design and Analysis of Human Identification Protocols (cryptographic protocols) 2014-12-09
Karine Heydemann - 2014-12-09
Nicolas Moro (University Pierre & Marie Curie, France) - Security of assembly programs against fault attacks on embedded processors (implementation) 2014-12-09
Viet Tung Hoang (University of California, Davis, United States of America) - Foundations of garbled circuits (foundations) 2014-10-16
Florian Legendre (University of Reims Champagne-Ardenne, France) - Exploitation de la logique propositionnelle pour la résolution de problèmes cryptograhiques (secret-key cryptography) 2014-09-29
Reinhard Posch - 2014-09-21
Elisabeth Oswald (Graz University of Technology, Austria) - On Side-Channel Attacks and the Application of Algorithmic Countermeasures (implementation) 2014-09-21
Carolyn Whitnall (University of Bristol, United Kingdom) - Statistical methods for non-profiled differential side-channel analysis: Theory and evaluation 2014-09-10
Robert Granger (University of Bristol, United Kingdom) - On Small Degree Extension Fields in Cryptology (public-key cryptography) 2014-09-07
Dwaine Clarke (Massachusetts Institute of Technology, United States of America) - Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data 2014-07-15
Chester Rebeiro (Indian Institute of Technology Kharagpur, India) - Analysis of Time Driven Cache Attacks on Block Ciphers (implementation) 2014-07-13
J. C. Migliore - 2014-06-25
Elisa Gorla - Lifting properties from the general hyperplane section of a projective scheme 2014-06-25
San Ling - 2014-06-21

Contact: phds (at) iacr.org

[ IACR home page ] [ IACR PhDs page ] © IACR