International Association for Cryptologic Research

Ph.D. Database

The aim of the IACR Ph.D. database is twofold. On the first hand, we want to offer an overview of Ph.D. already completed in the domain of cryptology. Where possible, this should also include a subject classification, an abstract, and access to the full text. On the second hand, it deals with Ph.D. subjects currently under investigation. This way, we provide a timely map of contemporary research in cryptology. All entries or changes need to be approved by an editor. You can contact them via phds (at)

You can add a new Ph.D. thesis here. Most entries (e.g. full text) can be added later. All entries can also be changed later.


  • Quicksearch
  • Search by name, institution, category, keywords or title of Ph.D. thesis
  • Extended Search

Latest 30 entries of 427 entries

show allSort by name year update Read as: Name (Institution that granted Ph.D.), Title of Thesis (category) - last change to database

Karim Abdellatif (University Pierre & Marie Curie, France) - Hardware Architectures for Cryptography (implementation) 2011-12-04
Dan Bogdanov (University of Tartu, Estonia) - Sharemind: programmable secure computations with practical applications (implementation) 2013-05-30
Demba Sow (Université Cheikh Anta Diop de Dakar-Sénégal) - courbes elliptiques, cryptographie à clé publique et protocoles d'échange de clés (public-key cryptography) 2013-09-10
Dries Schellekens (Katholieke Universiteit Leuven, Belgium) - Design and Analysis of Trusted Computing Platforms (applications) 2013-01-09
Amitabh Das (Katholieke Universiteit Leuven, Belgium) - Differential Scan-Based Side-Channel Attacks and Countermeasures (implementation) 2013-12-03
Viet Tung Hoang (University of California, Davis, United States of America) - Foundations of garbled circuits (foundations) 2013-07-01
Alexander Meurer (Ruhr University Bochum, Germany) - A Coding-Theoretic Approach to Cryptanalysis (foundations) 2013-07-03
R. Vimalathithan (Anna University , India) - Cryptanalysis using Computational Intelligence (secret-key cryptography) 2013-06-12
Yossef Oren (Columbia University, United States of America) - Secure Hardware - Physical Attacks and Countermeasures (implementation) 2014-01-04
Cuauhtemoc Mancillas López (Center for Research and Advanced Studies of the National Polytechnic Institute of Mexico (CINVESTAV-IPN), México) - Studies on Disk Encryption (secret-key cryptography) 2013-06-02
Zachary Kissel (University of Massachusetts Lowell, USA) - Verifiable Symmetric Searchable Encryption (secret-key cryptography) 2014-01-05
Aleksandar Kircanski (Concordia University, Canada) - Cryptanalysis of Symmetric Cryptographic Primitives (secret-key cryptography) 2013-12-03
Enrico Thomae (Ruhr University Bochum, Germany) - About the Security of Multivariate Quadratic Public Key Schemes (public-key cryptography) 2013-07-06
Sebastian Pape (University of Kassel, Germany) - The Challenge of Authentication in Insecure Environments (secret-key cryptography) 2014-01-06
Constantin Catalin Dragan (Alexandru Ioan Cuza University of Iasi, Romania) - Security of CRT-based Secret Sharing Schemes 2014-02-13
Ruxandra F. Olimid (University of Bucharest) - Secret Sharing-based Group Key Establishment 2014-01-26
Özgül Küçük (Katholieke Universiteit Leuven, Belgium) - Design and Analysis of Cryptographic Hash Functions (secret-key cryptography) 2012-05-04
Vincent Verneuil (Université de Bordeaux, France) - Elliptic curve cryptography and security of embedded devices (implementation) 2012-11-02
Marc Stevens (Leiden University, the Netherlands) - Attacks on Hash Functions and Applications (secret-key cryptography) 2013-03-01
Pouyan Sepehrdad (Ecole Polytechnique Fédérale de Lausanne, Switzerland) - Statistical and Algebraic Cryptanalysis of Lightweight and Ultra-Lightweight Symmetric Primitives (secret-key cryptography) 2012-11-02
Stephan Krenn (University of Fribourg, Swiss) - Bringing Zero-Knowledge Proofs of Knowledge to Practice (cryptographic protocols) 2013-05-30
Shi Bai (The Australian National University) - Polynomial selection for the number field sieve (foundations) 2012-11-02
Edoardo Persichetti (University of Auckland, New Zealand) - Improving the Efficiency of Code-Based Cryptography (public-key cryptography) 2013-01-06
Sujoy Sinha Roy (Indian Institute of Technology Kharagpur, India) - Design and Analysis of Elliptic Curve Cryptosystems on FPGAs (implementation) 2012-06-23
Roel Peeters (Katholieke Universiteit Leuven, Belgium) - Security Architecture for Things That Think (cryptographic protocols) 2012-07-08
Nicolas Guillermin (University Rennes 1 (France)) - Implémentation matérielle de coprocesseurs haute performance pour la cryptographie asymétrique (implementation) 2012-05-11
Junko Takahashi (The University of Electro-Communications, Japan) - Security Evaluation of Side-Channel Resistance for Symmetric Ciphers Using Experimental and Theoretical Approaches (implementation) 2013-01-07
Joppe W. Bos (Ecole Polytechnique Fédérale de Lausanne, Switzerland) - On the Cryptanalysis of Public-Key Cryptography (public-key cryptography) 2012-03-29
Sk Subidh (Indian Institute of Technology Kharagpur, India) - Differential Fault Analysis of Block Ciphers (implementation) 2013-09-10
Abdoul Aziz Ciss (Ruhr University Bochum, Germany) - Arithmétique et Extracteurs déterministes sur les courbes elliptiques (public-key cryptography) 2012-03-25

Contact: phds (at)

[ IACR home page ] [ IACR PhDs page ] © IACR