International Association for Cryptologic Research

Ph.D. Database

The aim of the IACR Ph.D. database is twofold. On the first hand, we want to offer an overview of Ph.D. already completed in the domain of cryptology. Where possible, this should also include a subject classification, an abstract, and access to the full text. On the second hand, it deals with Ph.D. subjects currently under investigation. This way, we provide a timely map of contemporary research in cryptology. All entries or changes need to be approved by an editor. You can contact them via phds (at) iacr.org.

You can add a new Ph.D. thesis here. Most entries (e.g. full text) can be added later. All entries can also be changed later.

Search

  • Quicksearch
  • Search by name, institution, category, keywords or title of Ph.D. thesis
  • Extended Search

Latest 30 entries of 458 entries

show allSort by name year update Read as: Name (Institution that granted Ph.D.), Title of Thesis (category) - last change to database

Karim Abdellatif (University Pierre & Marie Curie, France) - Hardware Architectures for Cryptography (implementation) 2011-12-04
Hadi Soleimany (Aalto University School of Science, Finland) - Studies in Lightweight Cryptography (secret-key cryptography) 2015-04-07
Pablo Rauzy (Télécom ParisTech (Paris, France)) - Formal Software Methods for Cryptosystems Implementation Security (implementation) 2015-04-07
Nizamuddin (Hazara University Mansehra, Pakistan) - On the Design of signcryption Schemes (public-key cryptography) 2014-05-22
Benjamin Fuller (Boston University, USA) - Strong Key Derivation from Noisy Sources (foundations) 2015-01-30
Florian Legendre (University of Reims Champagne-Ardenne, France) - Exploitation de la logique propositionnelle pour la résolution de problèmes cryptograhiques (secret-key cryptography) 2014-09-29
Md Mokammel Haque (Macquarie University, Australia) - Lattice-based Cryptanalysis for Secure Cryptosystems (applications) 2014-12-10
Elisa Gorla - Lifting properties from the general hyperplane section of a projective scheme 2014-06-25
Nicolas Moro (University Pierre & Marie Curie, France) - Security of assembly programs against fault attacks on embedded processors (implementation) 2014-12-09
Maike Massierer (Universität Basel, Switzerland) - Trace zero varieties in cryptography: Optimal representation and index calculus (public-key cryptography) 2014-06-21
Josep Balasch (Katholieke Universiteit Leuven, Belgium) - Implementation Aspects of Security and Privacy in Embedded Design (implementation) 2014-05-22
Nishant Doshi (S V National Institute of Technology, Surat, India) - Investigating Approaches for Improving the Ciphertext Policy Attribute Based Encryption (public-key cryptography) 2015-05-05
Aleksandar Kircanski (Concordia University, Canada) - Cryptanalysis of Symmetric Cryptographic Primitives (secret-key cryptography) 2013-12-03
Dan Bogdanov (University of Tartu, Estonia) - Sharemind: programmable secure computations with practical applications (implementation) 2013-05-30
Viet Tung Hoang (University of California, Davis, United States of America) - Foundations of garbled circuits (foundations) 2014-10-16
Cuauhtemoc Mancillas López (Center for Research and Advanced Studies of the National Polytechnic Institute of Mexico (CINVESTAV-IPN), México) - Studies on Disk Encryption (secret-key cryptography) 2013-06-02
Sebastian Pape (University of Kassel, Germany) - The Challenge of Authentication in Insecure Environments (secret-key cryptography) 2014-01-06
Enrico Thomae (Ruhr University Bochum, Germany) - About the Security of Multivariate Quadratic Public Key Schemes (public-key cryptography) 2013-07-06
Yossef Oren (Columbia University, United States of America) - Secure Hardware - Physical Attacks and Countermeasures (implementation) 2014-01-04
Amitabh Das (Katholieke Universiteit Leuven, Belgium) - Differential Scan-Based Side-Channel Attacks and Countermeasures (implementation) 2013-12-03
Sareh Emami (Macquarie University, Australia) - Security Analysis of Cryptographic Algorithms (secret-key cryptography) 2014-12-15
Aurore Guillevic (Ecole Normale Supérieure, France) - Arithmetic of pairings on algebraic curves for cryptography (public-key cryptography) 2015-05-04
Zachary Kissel (University of Massachusetts Lowell, USA) - Verifiable Symmetric Searchable Encryption (secret-key cryptography) 2014-01-05
Alexander Meurer (Ruhr University Bochum, Germany) - A Coding-Theoretic Approach to Cryptanalysis (foundations) 2013-07-03
Dries Schellekens (Katholieke Universiteit Leuven, Belgium) - Design and Analysis of Trusted Computing Platforms (applications) 2013-01-09
Ruxandra F. Olimid (University of Bucharest) - Secret Sharing-based Group Key Establishment 2014-01-26
Chester Rebeiro (Indian Institute of Technology Kharagpur, India) - Analysis of Time Driven Cache Attacks on Block Ciphers (implementation) 2014-07-13
R. Vimalathithan (Anna University , India) - Cryptanalysis using Computational Intelligence (secret-key cryptography) 2013-06-12
Przemyslaw Sokolowski (Macquarie University, Australia) - Contributions to cryptanalysis: design and analysis of cryptographic hash functions (secret-key cryptography) 2015-02-22
Demba Sow (Université Cheikh Anta Diop de Dakar-Sénégal) - courbes elliptiques, cryptographie à clé publique et protocoles d'échange de clés (public-key cryptography) 2013-09-10

Contact: phds (at) iacr.org

[ IACR home page ] [ IACR PhDs page ] © IACR