International Association for Cryptologic Research

Ph.D. Database

The aim of the IACR Ph.D. database is twofold. On the first hand, we want to offer an overview of Ph.D. already completed in the domain of cryptology. Where possible, this should also include a subject classification, an abstract, and access to the full text. On the second hand, it deals with Ph.D. subjects currently under investigation. This way, we provide a timely map of contemporary research in cryptology. All entries or changes need to be approved by an editor. You can contact them via phds (at) iacr.org.

You can add a new Ph.D. thesis here. Most entries (e.g. full text) can be added later. All entries can also be changed later.

Search

  • Quicksearch
  • Search by name, institution, category, keywords or title of Ph.D. thesis
  • Extended Search

Latest 30 entries of 474 entries

show allSort by name year update Read as: Name (Institution that granted Ph.D.), Title of Thesis (category) - last change to database

Sebastian Pape (University of Kassel, Germany) - The Challenge of Authentication in Insecure Environments (secret-key cryptography) 2016-12-01
Fabrice Benhamouda (PSL Research University and École normale supérieure, France, France) - Diverse modules and zero-knowledge (public-key cryptography) 2016-11-25
Michel Abdalla (University of California, San Diego, United States of America) - Design and Analysis of Secure Encryption Schemes 2016-11-25
Shehzad Ashraf Chaudhry (International Islamic University, Islamabad, Pakistan) - Design and Analysis of Secure Lightweight Authentication and Signcryption Schemes (cryptographic protocols) 2016-11-25
Shashank Singh (Indian Statistical Institute, India) - Studies on Index Calculus Techniques for the Discrete Log Problem (foundations) 2016-11-25
Mehrdad Nojoumian (University of Waterloo, Canada) - Novel Secret Sharing and Commitment Schemes for Cryptographic Applications (cryptographic protocols) 2016-11-16
Jesper Buus Nielsen (University of Aarhus, Denmark) - On Protocol Security in the Cryptographic Model 2016-11-16
Shekh Faisal Abdul-Latip (University of Wollongong, Australia) - Algebraic and Side-Channel Analysis of Lightweight Block Ciphers (secret-key cryptography) 2016-11-16
Ewerton Rodrigues Andrade (Escola Politécnica, University of São Paulo, Brazil) - Lyra2: Password Hashing Scheme with improved security against time-memory trade-offs (cryptographic protocols) 2016-11-16
Roman Korkikian (Ecole Normale Supérieure, France) - Side-Channel and Fault Analysis in the Presence of Countermeasures: Tools, Theory and Practice (implementation) 2016-11-16
Yossef Oren - Secure Hardware - Physical Attacks and Countermeasures (implementation) 2016-04-11
Liran Lerman - A Machine Learning Approach for Automatic and Generic Side-Channel Attacks (implementation) 2016-04-01
Marko Wolf (Ruhr University Bochum, Germany) - Security Engineering for Vehicular IT Systems — Improving Trustworthiness and Dependability of Automotive IT Applications (applications) 2016-02-13
Behrooz khadem - A Chaotic Self-Synchronizing Stream Cipher and Its Application in Image Encryption 2016-01-29
Luk Bettale (University Pierre & Marie Curie, France) - Algebraic Cryptanalysis: Tools and Applications (applications) 2016-01-22
Seungjoo Kim (Sungkyunkwan University, South Korea) - Improved privacy and authenticity in digital signatures / key management (cryptographic protocols) 2016-01-22
Martin Vuagnoux (Ecole Polytechnique Fédérale de Lausanne, Switzerland) - Computer Aided Cryptanalysis from Ciphers to Side Channels (cryptographic protocols) 2016-01-22
Nizamud Din (Hazara University Mansehra, Pakistan) - Design and Analysis of Multi Receiver Signcryption Schemes on Elliptic Curves (public-key cryptography) 2016-01-22
Janaka Alawatugoda (Queensland University of Technology, Australia) - On the leakage resilience of secure channel establishment (public-key cryptography) 2015-12-17
Alireza Jolfaei (Griffith University) - Robust Encryption Schemes for 3D Content Protection (applications) 2015-12-17
Mario Larangeira (Tokyo Institute of Technology) - Programmable and Non-programmable Models in Security Proofs (public-key cryptography) 2015-12-17
Saqib A. Kakvi (Ruhr University Bochum, Germany) - On the Improvement of Security Proofs: Bridging the Gap between Theory and Practice (foundations) 2015-09-30
Dr. Ratna Dutta (Indian Statistical Institute, Kolkata, India, INDIA) - Studies on Pairing-Based and Constant Round Dynamic Group Key Agreement Protocols 2015-07-28
Dr. Y. Sreenivasa Rao - Design and Analysis of Attribute-Based Cryptosystems using Bilinear Pairings (public-key cryptography) 2015-07-28
Filipe Beato (Katholieke Universiteit Leuven, Belgium) - Private Information Sharing in Online communities (cryptographic protocols) 2015-06-19
Nishant Doshi - Investigating Approaches for Improving the Ciphertext Policy Attribute Based Encryption (public-key cryptography) 2015-06-04
Dai Yamamoto (The University of Electro-Communications, Japan) - Security Evaluation and Improvement of Physically Unclonable Functions (implementation) 2015-06-04
Liam Keliher - Linear Cryptanalysis of Substitution-Permutation Networks (secret-key cryptography) 2015-05-09
Damien Vergnaud - 2015-05-04
Aurore Guillevic (Ecole Normale Supérieure, France) - Arithmetic of pairings on algebraic curves for cryptography (public-key cryptography) 2015-05-04

Contact: phds (at) iacr.org

[ IACR home page ] [ IACR PhDs page ] © IACR