International Association for Cryptologic Research

Ph.D. Database

The aim of the IACR Ph.D. database is twofold. On the first hand, we want to offer an overview of Ph.D. already completed in the domain of cryptology. Where possible, this should also include a subject classification, an abstract, and access to the full text. On the second hand, it deals with Ph.D. subjects currently under investigation. This way, we provide a timely map of contemporary research in cryptology. All entries or changes need to be approved by an editor. You can contact them via phds (at)

You can add a new Ph.D. thesis here. Most entries (e.g. full text) can be added later. All entries can also be changed later.


  • Quicksearch
  • Search by name, institution, category, keywords or title of Ph.D. thesis
  • Extended Search

Latest 30 entries of 462 entries

show allSort by name year update Read as: Name (Institution that granted Ph.D.), Title of Thesis (category) - last change to database

Saqib A. Kakvi (Ruhr University Bochum, Germany) - On the Improvement of Security Proofs: Bridging the Gap between Theory and Practice (foundations) 2015-09-30
Dr. Ratna Dutta (Indian Statistical Institute, Kolkata, India, INDIA) - Studies on Pairing-Based and Constant Round Dynamic Group Key Agreement Protocols 2015-07-28
Dr. Y. Sreenivasa Rao - Design and Analysis of Attribute-Based Cryptosystems using Bilinear Pairings (public-key cryptography) 2015-07-28
Filipe Beato (Katholieke Universiteit Leuven, Belgium) - Private Information Sharing in Online communities (cryptographic protocols) 2015-06-19
Nishant Doshi - Investigating Approaches for Improving the Ciphertext Policy Attribute Based Encryption (public-key cryptography) 2015-06-04
Dai Yamamoto (The University of Electro-Communications, Japan) - Security Evaluation and Improvement of Physically Unclonable Functions (implementation) 2015-06-04
Liam Keliher - Linear Cryptanalysis of Substitution-Permutation Networks (secret-key cryptography) 2015-05-09
Damien Vergnaud - 2015-05-04
Aurore Guillevic (Ecole Normale Supérieure, France) - Arithmetic of pairings on algebraic curves for cryptography (public-key cryptography) 2015-05-04
Pablo Rauzy (Télécom ParisTech (Paris, France)) - Formal Software Methods for Cryptosystems Implementation Security (implementation) 2015-04-07
Hadi Soleimany (Aalto University School of Science, Finland) - Studies in Lightweight Cryptography (secret-key cryptography) 2015-04-07
Juraj Šarinay (Ecole Polytechnique Fédérale de Lausanne, Switzerland) - Cryptographic Hash Functions in Groups and Provable Properties 2015-04-07
Przemyslaw Sokolowski (Macquarie University, Australia) - Contributions to cryptanalysis: design and analysis of cryptographic hash functions (secret-key cryptography) 2015-02-22
Benjamin Fuller (Boston University, USA) - Strong Key Derivation from Noisy Sources (foundations) 2015-01-30
Jian Guo (Nanyang Technological University, Singapore) - Analysis of Cryptographic Hash Functions (secret-key cryptography) 2015-01-30
Pascal Junod (Ecole Polytechnique Fédérale de Lausanne, Switzerland) - Statistical cryptanalysis of block ciphers (secret-key cryptography) 2014-12-25
Serge Vaudenay (University of Paris 7 - Denis Diderot, France) - The Security of Cryptographic Primitives (secret-key cryptography) 2014-12-25
Ludovic Perret (Marne-la-Vallée university) - Algebraic and Combinatorial Tools for Public Key Cryptography (public-key cryptography) 2014-12-25
Olivier Billet (University of Versailles, France) - Cryptologie multivariable 2014-12-22
Khaled Ouafi (Ecole Polytechnique Fédérale de Lausanne, Switzerland) - Security and Privacy in RFID Systems (cryptographic protocols) 2014-12-20
Jacques Patarin (Université Paris 6) - Étude des générateurs de permutations pseudo-aléatoires basés sur le schéma du D.E.S. (secret-key cryptography) 2014-12-20
Vijayakrishnan Pasupathinathan (Macquarie University, Australia) - Hardware-based Identification and Authentication Systems (applications) 2014-12-17
Josef Pieprzyk - 2014-12-17
Mike Rosulek (University of Illinois, United States of America) - The Structure of Secure Multi-Party Computation (foundations) 2014-12-17
Sareh Emami (Macquarie University, Australia) - Security Analysis of Cryptographic Algorithms (secret-key cryptography) 2014-12-15
Huaxiong Wang - 2014-12-15
Anderson C. A. Nascimento (University of Tokyo) - Bounds and Constructions for Mutually Distrustful Information Theoretically Secure Cryptographic Protocols (foundations) 2014-12-15
Hideki Imai - 2014-12-15
Christophe Tartary (Macquarie University, Australia) - Authentication for Multicast Authentication (cryptographic protocols) 2014-12-15
Md Mokammel Haque (Macquarie University, Australia) - Lattice-based Cryptanalysis for Secure Cryptosystems (applications) 2014-12-10

Contact: phds (at)

[ IACR home page ] [ IACR PhDs page ] © IACR