International Association for Cryptologic Research

Ph.D. Database

The aim of the IACR Ph.D. database is twofold. On the first hand, we want to offer an overview of Ph.D. already completed in the domain of cryptology. Where possible, this should also include a subject classification, an abstract, and access to the full text. On the second hand, it deals with Ph.D. subjects currently under investigation. This way, we provide a timely map of contemporary research in cryptology. All entries or changes need to be approved by an editor. You can contact them via phds (at) iacr.org.

You can add a new Ph.D. thesis here. Most entries (e.g. full text) can be added later. All entries can also be changed later.

Search

  • Quicksearch
  • Search by name, institution, category, keywords or title of Ph.D. thesis
  • Extended Search

Latest 30 entries of 474 entries

show allSort by name year update Read as: Name (Institution that granted Ph.D.), Title of Thesis (category) - last change to database

Fabrice Benhamouda (PSL Research University and École normale supérieure, France, France) - Diverse modules and zero-knowledge (public-key cryptography) 2016-11-25
Shehzad Ashraf Chaudhry (International Islamic University, Islamabad, Pakistan) - Design and Analysis of Secure Lightweight Authentication and Signcryption Schemes (cryptographic protocols) 2016-11-25
Ewerton Rodrigues Andrade (Escola Politécnica, University of São Paulo, Brazil) - Lyra2: Password Hashing Scheme with improved security against time-memory trade-offs (cryptographic protocols) 2016-11-16
Shashank Singh (Indian Statistical Institute, India) - Studies on Index Calculus Techniques for the Discrete Log Problem (foundations) 2016-11-25
Roman Korkikian (Ecole Normale Supérieure, France) - Side-Channel and Fault Analysis in the Presence of Countermeasures: Tools, Theory and Practice (implementation) 2016-11-16
Filipe Beato (Katholieke Universiteit Leuven, Belgium) - Private Information Sharing in Online communities (cryptographic protocols) 2015-06-19
Dai Yamamoto (The University of Electro-Communications, Japan) - Security Evaluation and Improvement of Physically Unclonable Functions (implementation) 2015-06-04
Saqib A. Kakvi (Ruhr University Bochum, Germany) - On the Improvement of Security Proofs: Bridging the Gap between Theory and Practice (foundations) 2015-09-30
Nizamud Din (Hazara University Mansehra, Pakistan) - Design and Analysis of Multi Receiver Signcryption Schemes on Elliptic Curves (public-key cryptography) 2016-01-22
Hadi Soleimany (Aalto University School of Science, Finland) - Studies in Lightweight Cryptography (secret-key cryptography) 2015-04-07
Pablo Rauzy (Télécom ParisTech (Paris, France)) - Formal Software Methods for Cryptosystems Implementation Security (implementation) 2015-04-07
Benjamin Fuller (Boston University, USA) - Strong Key Derivation from Noisy Sources (foundations) 2015-01-30
Behrooz khadem - A Chaotic Self-Synchronizing Stream Cipher and Its Application in Image Encryption 2016-01-29
Janaka Alawatugoda (Queensland University of Technology, Australia) - On the leakage resilience of secure channel establishment (public-key cryptography) 2015-12-17
Alireza Jolfaei (Griffith University) - Robust Encryption Schemes for 3D Content Protection (applications) 2015-12-17
Dr. Y. Sreenivasa Rao - Design and Analysis of Attribute-Based Cryptosystems using Bilinear Pairings (public-key cryptography) 2015-07-28
Liran Lerman - A Machine Learning Approach for Automatic and Generic Side-Channel Attacks (implementation) 2016-04-01
Karim Abdellatif (University Pierre & Marie Curie, France) - Hardware Architectures for Cryptography (implementation) 2011-12-04
Md Mokammel Haque (Macquarie University, Australia) - Lattice-based Cryptanalysis for Secure Cryptosystems (applications) 2014-12-10
Josep Balasch (Katholieke Universiteit Leuven, Belgium) - Implementation Aspects of Security and Privacy in Embedded Design (implementation) 2014-05-22
Maike Massierer (Universität Basel, Switzerland) - Trace zero varieties in cryptography: Optimal representation and index calculus (public-key cryptography) 2014-06-21
Elisa Gorla - Lifting properties from the general hyperplane section of a projective scheme 2014-06-25
Nishant Doshi - Investigating Approaches for Improving the Ciphertext Policy Attribute Based Encryption (public-key cryptography) 2015-06-04
Nicolas Moro (University Pierre & Marie Curie, France) - Security of assembly programs against fault attacks on embedded processors (implementation) 2014-12-09
Florian Legendre (University of Reims Champagne-Ardenne, France) - Exploitation de la logique propositionnelle pour la résolution de problèmes cryptograhiques (secret-key cryptography) 2014-09-29
Amitabh Das (Katholieke Universiteit Leuven, Belgium) - Differential Scan-Based Side-Channel Attacks and Countermeasures (implementation) 2013-12-03
Cuauhtemoc Mancillas López (Center for Research and Advanced Studies of the National Polytechnic Institute of Mexico (CINVESTAV-IPN), México) - Studies on Disk Encryption (secret-key cryptography) 2013-06-02
Enrico Thomae (Ruhr University Bochum, Germany) - About the Security of Multivariate Quadratic Public Key Schemes (public-key cryptography) 2013-07-06
Yossef Oren - Secure Hardware - Physical Attacks and Countermeasures (implementation) 2016-04-11
Viet Tung Hoang (University of California, Davis, United States of America) - Foundations of garbled circuits (foundations) 2014-10-16

Contact: phds (at) iacr.org

[ IACR home page ] [ IACR PhDs page ] © IACR