International Association for Cryptologic Research

Ph.D. Database

The aim of the IACR Ph.D. database is twofold. On the first hand, we want to offer an overview of Ph.D. already completed in the domain of cryptology. Where possible, this should also include a subject classification, an abstract, and access to the full text. On the second hand, it deals with Ph.D. subjects currently under investigation. This way, we provide a timely map of contemporary research in cryptology. All entries or changes need to be approved by an editor. You can contact them via phds (at)

You can add a new Ph.D. thesis here. Most entries (e.g. full text) can be added later. All entries can also be changed later.


  • Quicksearch
  • Search by name, institution, category, keywords or title of Ph.D. thesis
  • Extended Search

Latest 30 entries of 447 entries

show allSort by name year update Read as: Name (Institution that granted Ph.D.), Title of Thesis (category) - last change to database

Vijayakrishnan Pasupathinathan (Macquarie University, Australia) - Hardware-based Identification and Authentication Systems (applications) 2014-12-17
Josef Pieprzyk - 2014-12-17
Mike Rosulek (University of Illinois, United States of America) - The Structure of Secure Multi-Party Computation (foundations) 2014-12-17
Sareh Emami (Macquarie University, Australia) - Security Analysis of Cryptographic Algorithms (secret-key cryptography) 2014-12-15
Huaxiong Wang - 2014-12-15
Anderson C. A. Nascimento (University of Tokyo) - Bounds and Constructions for Mutually Distrustful Information Theoretically Secure Cryptographic Protocols (foundations) 2014-12-15
Hideki Imai - 2014-12-15
Christophe Tartary (Macquarie University, Australia) - Authentication for Multicast Authentication (cryptographic protocols) 2014-12-15
Md Mokammel Haque (Macquarie University, Australia) - Lattice-based Cryptanalysis for Secure Cryptosystems (applications) 2014-12-10
Miklos Santha - 2014-12-10
Henri Gilbert (University Paris 11 - Orsay) - Cryptanalyse des algorithmes de chiffrement symétrique (secret-key cryptography) 2014-12-10
Hassan Jameel Asghar (Macquarie University, Australia) - Design and Analysis of Human Identification Protocols (cryptographic protocols) 2014-12-09
Karine Heydemann - 2014-12-09
Nicolas Moro (University Pierre & Marie Curie, France) - Security of assembly programs against fault attacks on embedded processors (implementation) 2014-12-09
Viet Tung Hoang (University of California, Davis, United States of America) - Foundations of garbled circuits (foundations) 2014-10-16
Florian Legendre (University of Reims Champagne-Ardenne, France) - Exploitation de la logique propositionnelle pour la résolution de problèmes cryptograhiques (secret-key cryptography) 2014-09-29
Reinhard Posch - 2014-09-21
Elisabeth Oswald (Graz University of Technology, Austria) - On Side-Channel Attacks and the Application of Algorithmic Countermeasures (implementation) 2014-09-21
Carolyn Whitnall (University of Bristol, United Kingdom) - Statistical methods for non-profiled differential side-channel analysis: Theory and evaluation 2014-09-10
Robert Granger (University of Bristol, United Kingdom) - On Small Degree Extension Fields in Cryptology (public-key cryptography) 2014-09-07
Dwaine Clarke (Massachusetts Institute of Technology, United States of America) - Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data 2014-07-15
Chester Rebeiro (Indian Institute of Technology Kharagpur, India) - Analysis of Time Driven Cache Attacks on Block Ciphers (implementation) 2014-07-13
J. C. Migliore - 2014-06-25
Elisa Gorla - Lifting properties from the general hyperplane section of a projective scheme 2014-06-25
San Ling - 2014-06-21
Lei Wei (Nanyang Technological University, Singapore) - Analysis of Iterated Block Ciphers (secret-key cryptography) 2014-06-21
Maike Massierer (Universität Basel, Switzerland) - Trace zero varieties in cryptography: Optimal representation and index calculus (public-key cryptography) 2014-06-21
Zubair Naqvi (University of Maryland, United States of America) - Security using Cryptographic Systems in Banks (public-key cryptography) 2014-05-26
Nizamuddin (Hazara University Mansehra, Pakistan) - On the Design of signcryption Schemes (public-key cryptography) 2014-05-22
Mehmet Sabir Kiraz (Technische Universiteit Eindhoven, The Netherlands) - Secure and Fair Two-Party Computation (cryptographic protocols) 2014-05-22

Contact: phds (at)

[ IACR home page ] [ IACR PhDs page ] © IACR