International Association for Cryptologic Research

Ph.D. Database

The aim of the IACR Ph.D. database is twofold. On the first hand, we want to offer an overview of Ph.D. already completed in the domain of cryptology. Where possible, this should also include a subject classification, an abstract, and access to the full text. On the second hand, it deals with Ph.D. subjects currently under investigation. This way, we provide a timely map of contemporary research in cryptology. All entries or changes need to be approved by an editor. You can contact them via phds (at)

You can add a new Ph.D. thesis here. Most entries (e.g. full text) can be added later. All entries can also be changed later.


  • Quicksearch
  • Search by name, institution, category, keywords or title of Ph.D. thesis
  • Extended Search

Latest 30 entries of 427 entries

show allSort by name year update Read as: Name (Institution that granted Ph.D.), Title of Thesis (category) - last change to database

Diego F. Aranha (University of Campinas) - Efficient software implementation of elliptic curves and bilinear pairings (implementation) 2014-03-19
Sourav Sen Gupta (Indian Statistical Institute, India) - Analysis and Implementation of RC4 Stream Cipher (secret-key cryptography) 2014-03-18
Julio Cesar López Hernández - 2014-03-18
Nizamuddin (Hazara University Mansehra, Pakistan) - On the Design of signcryption Schemes (public-key cryptography) 2014-02-13
Constantin Catalin Dragan (Alexandru Ioan Cuza University of Iasi, Romania) - Security of CRT-based Secret Sharing Schemes 2014-02-13
Claude Carlet - 2014-01-27
Abdelaziz Elaabid - Side channel attacks: advanced experimentations on template attacks (secret-key cryptography) 2014-01-27
Ferucio Laurentiu Tiplea - 2014-01-26
Ruxandra F. Olimid (University of Bucharest) - Secret Sharing-based Group Key Establishment 2014-01-26
Adrian Atanasiu - 2014-01-26
Serge Vaudenay (University of Paris 7 - Denis Diderot, France) - The Security of Cryptographic Primitives (secret-key cryptography) 2014-01-15
Kwangsu Lee (Korea University, Korea) - Efficient Hidden Vector Encryptions and Its Applications (public-key cryptography) 2014-01-07
Sebastian Pape (University of Kassel, Germany) - The Challenge of Authentication in Insecure Environments (secret-key cryptography) 2014-01-06
Lutz Wegner - 2014-01-06
Emmanuelle Encrenaz - 2014-01-05
Bruno Robisson - 2014-01-05
Dong Hoon Lee (The University of Oklahoma, USA) - 2014-01-05
Amr Youssef - 2014-01-05
Zachary Kissel (University of Massachusetts Lowell, USA) - Verifiable Symmetric Searchable Encryption (secret-key cryptography) 2014-01-05
Jie Wang (Boston University, USA) - Polynomial Time Creativity and its Applications (P-Creativity) 2014-01-05
Yossef Oren (Columbia University, United States of America) - Secure Hardware - Physical Attacks and Countermeasures (implementation) 2014-01-04
Ingrid Verbauwhede (Katholieke Universiteit Leuven, Belgium) - VLSI Design Methodologies for the ASIC realization of cryptographic and algebraic systems 2013-12-03
Nicolas Moro (University Pierre & Marie Curie, France) - Complex security strategies for secure embedded circuits (implementation) 2013-12-03
Amitabh Das (Katholieke Universiteit Leuven, Belgium) - Differential Scan-Based Side-Channel Attacks and Countermeasures (implementation) 2013-12-03
Daniel Wichs (New York University, USA) - Cryptographic Resilience to Continual Information Leakage (foundations) 2013-12-03
Aleksandar Kircanski (Concordia University, Canada) - Cryptanalysis of Symmetric Cryptographic Primitives (secret-key cryptography) 2013-12-03
Sk Subidh (Indian Institute of Technology Kharagpur, India) - Differential Fault Analysis of Block Ciphers (implementation) 2013-09-10
C. Eric (Carl) Bach - 2013-09-10
Joan Daemen (Katholieke Universiteit Leuven, Belgium) - Cipher and hash function design - Strategies based on linear and differential cryptanalysis (secret-key cryptography) 2013-09-10
Sherman S. M. Chow (New York University, USA) - New Privacy-Preserving Architectures for Identity-/Attribute-Based Encryption (public-key cryptography) 2013-09-10

Contact: phds (at)

[ IACR home page ] [ IACR PhDs page ] © IACR