International Association for Cryptologic Research

Ph.D. Database

The aim of the IACR Ph.D. database is twofold. On the first hand, we want to offer an overview of Ph.D. already completed in the domain of cryptology. Where possible, this should also include a subject classification, an abstract, and access to the full text. On the second hand, it deals with Ph.D. subjects currently under investigation. This way, we provide a timely map of contemporary research in cryptology. All entries or changes need to be approved by an editor. You can contact them via phds (at)

You can add a new Ph.D. thesis here. Most entries (e.g. full text) can be added later. All entries can also be changed later.


  • Quicksearch
  • Search by name, institution, category, keywords or title of Ph.D. thesis
  • Extended Search

All 485 entries

limit to 30Sort by name year update Read as: Name (Institution that granted Ph.D.), Title of Thesis (category) - last change to database

Rafik Chaabouni (Ecole Polytechnique Fédérale de Lausanne, Switzerland) - Enhancing Privacy Protection: Set Membership, Range Proofs, and the Extended Access Control (cryptographic protocols) 2017-04-19
Bernardo Magri (Sapienza University of Rome) - The Good, the Bad, and the (not so) Ugly: Many Facets of Cryptographic Backdoors (public-key cryptography) 2017-04-22
Sonia Mihaela Bogos (Ecole Polytechnique Fédérale de Lausanne, Switzerland) - LPN in Cryptography: an Algorithmic Study (public-key cryptography) 2017-06-30
Fabrice Benhamouda (PSL Research University and École normale supérieure, France, France) - Diverse modules and zero-knowledge (public-key cryptography) 2016-11-25
Roman Korkikian (Ecole Normale Supérieure, France) - Side-Channel and Fault Analysis in the Presence of Countermeasures: Tools, Theory and Practice (implementation) 2017-03-31
Thijs Laarhoven (Technische Universiteit Eindhoven) - Search problems in cryptography: from fingerprinting to lattice sieving (foundations) 2017-07-09
Shehzad Ashraf Chaudhry (International Islamic University, Islamabad, Pakistan) - Design and Analysis of Secure Lightweight Authentication and Signcryption Schemes (cryptographic protocols) 2016-11-25
Ewerton Rodrigues Andrade (Escola Politécnica, University of São Paulo, Brazil) - Lyra2: Password Hashing Scheme with improved security against time-memory trade-offs (cryptographic protocols) 2016-11-16
Dimitrios Papadopoulos (Boston University, USA) - Function-specific schemes for verifiable computatio (cryptographic protocols) 2017-03-31
Shashank Singh (Indian Statistical Institute, India) - Studies on Index Calculus Techniques for the Discrete Log Problem (foundations) 2017-03-31
Pablo Rauzy (Télécom ParisTech (Paris, France)) - Formal Software Methods for Cryptosystems Implementation Security (implementation) 2015-04-07
Alireza Jolfaei (Griffith University) - Robust Encryption Schemes for 3D Content Protection (applications) 2015-12-17
Janaka Alawatugoda (Queensland University of Technology, Australia) - On the leakage resilience of secure channel establishment (public-key cryptography) 2015-12-17
Benjamin Fuller (Boston University, USA) - Strong Key Derivation from Noisy Sources (foundations) 2015-01-30
Hadi Soleimany (Aalto University School of Science, Finland) - Studies in Lightweight Cryptography (secret-key cryptography) 2015-04-07
Behrooz khadem - A Chaotic Self-Synchronizing Stream Cipher and Its Application in Image Encryption 2016-01-29
Karim Abdellatif (University Pierre & Marie Curie, France) - Hardware Architectures for Cryptography (implementation) 2011-12-04
Dai Yamamoto (The University of Electro-Communications, Japan) - Security Evaluation and Improvement of Physically Unclonable Functions (implementation) 2015-06-04
Saqib A. Kakvi (Ruhr University Bochum, Germany) - On the Improvement of Security Proofs: Bridging the Gap between Theory and Practice (foundations) 2017-07-21
Alexandre Duc (Ecole Polytechnique Fédérale de Lausanne, Switzerland) - Making Theory Closer to Practice in Post-quantum and Leakage-resilient Cryptography 2017-03-31
Nizamud Din (Hazara University Mansehra, Pakistan) - Design and Analysis of Multi Receiver Signcryption Schemes on Elliptic Curves (public-key cryptography) 2016-01-22
Filipe Beato (Katholieke Universiteit Leuven, Belgium) - Private Information Sharing in Online communities (cryptographic protocols) 2015-06-19
Liran Lerman - A Machine Learning Approach for Automatic and Generic Side-Channel Attacks (implementation) 2016-04-01
Dr. Y. Sreenivasa Rao - Design and Analysis of Attribute-Based Cryptosystems using Bilinear Pairings (public-key cryptography) 2015-07-28
Josep Balasch (Katholieke Universiteit Leuven, Belgium) - Implementation Aspects of Security and Privacy in Embedded Design (implementation) 2014-05-22
Nishant Doshi - Investigating Approaches for Improving the Ciphertext Policy Attribute Based Encryption (public-key cryptography) 2015-06-04
Elisa Gorla - Lifting properties from the general hyperplane section of a projective scheme 2014-06-25
Florian Legendre (University of Reims Champagne-Ardenne, France) - Exploitation de la logique propositionnelle pour la résolution de problèmes cryptograhiques (secret-key cryptography) 2014-09-29
Md Mokammel Haque (Macquarie University, Australia) - Lattice-based Cryptanalysis for Secure Cryptosystems (applications) 2014-12-10
Nicolas Moro (University Pierre & Marie Curie, France) - Security of assembly programs against fault attacks on embedded processors (implementation) 2014-12-09
Maike Massierer (Universität Basel, Switzerland) - Trace zero varieties in cryptography: Optimal representation and index calculus (public-key cryptography) 2014-06-21
Zachary Kissel (University of Massachusetts Lowell, USA) - Verifiable Symmetric Searchable Encryption (secret-key cryptography) 2014-01-05
Amitabh Das (Katholieke Universiteit Leuven, Belgium) - Differential Scan-Based Side-Channel Attacks and Countermeasures (implementation) 2013-12-03
Aurore Guillevic (Ecole Normale Supérieure, France) - Arithmetic of pairings on algebraic curves for cryptography (public-key cryptography) 2015-05-04
Yossef Oren - Secure Hardware - Physical Attacks and Countermeasures (implementation) 2016-04-11
Przemyslaw Sokolowski (Macquarie University, Australia) - Contributions to cryptanalysis: design and analysis of cryptographic hash functions (secret-key cryptography) 2015-02-22
Sareh Emami (Macquarie University, Australia) - Security Analysis of Cryptographic Algorithms (secret-key cryptography) 2014-12-15
Chester Rebeiro (Indian Institute of Technology Kharagpur, India) - Analysis of Time Driven Cache Attacks on Block Ciphers (implementation) 2014-07-13
Sebastian Pape (University of Kassel, Germany) - The Challenge of Authentication in Insecure Environments (secret-key cryptography) 2016-12-01
Ruxandra F. Olimid (University of Bucharest) - Secret Sharing-based Group Key Establishment 2014-01-26
Constantin Catalin Dragan (Alexandru Ioan Cuza University of Iasi, Romania) - Security of CRT-based Secret Sharing Schemes 2014-02-13
Dries Schellekens (Katholieke Universiteit Leuven, Belgium) - Design and Analysis of Trusted Computing Platforms (applications) 2013-01-09
Aleksandar Kircanski (Concordia University, Canada) - Cryptanalysis of Symmetric Cryptographic Primitives (secret-key cryptography) 2013-12-03
Dan Bogdanov (University of Tartu, Estonia) - Sharemind: programmable secure computations with practical applications (implementation) 2013-05-30
Cuauhtemoc Mancillas López (Center for Research and Advanced Studies of the National Polytechnic Institute of Mexico (CINVESTAV-IPN), México) - Studies on Disk Encryption (secret-key cryptography) 2013-06-02
Enrico Thomae (Ruhr University Bochum, Germany) - About the Security of Multivariate Quadratic Public Key Schemes (public-key cryptography) 2013-07-06
Viet Tung Hoang (University of California, Davis, United States of America) - Foundations of garbled circuits (foundations) 2014-10-16
R. Vimalathithan (Anna University , India) - Cryptanalysis using Computational Intelligence (secret-key cryptography) 2013-06-12
Mario Larangeira (Tokyo Institute of Technology) - Programmable and Non-programmable Models in Security Proofs (public-key cryptography) 2015-12-17
Alexander Meurer (Ruhr University Bochum, Germany) - A Coding-Theoretic Approach to Cryptanalysis (foundations) 2013-07-03
Demba Sow (Université Cheikh Anta Diop de Dakar-Sénégal) - courbes elliptiques, cryptographie à clé publique et protocoles d'échange de clés (public-key cryptography) 2013-09-10
Carolyn Whitnall (University of Bristol, United Kingdom) - Statistical methods for non-profiled differential side-channel analysis: Theory and evaluation 2014-09-10
Junko Takahashi (The University of Electro-Communications, Japan) - Security Evaluation of Side-Channel Resistance for Symmetric Ciphers Using Experimental and Theoretical Approaches (implementation) 2013-01-07
Stephan Krenn (University of Fribourg, Swiss) - Bringing Zero-Knowledge Proofs of Knowledge to Practice (cryptographic protocols) 2013-05-30
Abdoul Aziz Ciss (Université Cheikh Anta Diop de Dakar, Senegal) - Arithmétique et Extracteurs déterministes sur les courbes elliptiques (public-key cryptography) 2017-06-15
Vincent Verneuil (Université de Bordeaux, France) - Elliptic curve cryptography and security of embedded devices (implementation) 2012-11-02
Shi Bai (The Australian National University) - Polynomial selection for the number field sieve (foundations) 2012-11-02
Lei Wei (Nanyang Technological University, Singapore) - Analysis of Iterated Block Ciphers (secret-key cryptography) 2014-06-21
Hassan Jameel Asghar (Macquarie University, Australia) - Design and Analysis of Human Identification Protocols (cryptographic protocols) 2014-12-09
Edoardo Persichetti (University of Auckland, New Zealand) - Improving the Efficiency of Code-Based Cryptography (public-key cryptography) 2013-01-06
Özgül Küçük (Katholieke Universiteit Leuven, Belgium) - Design and Analysis of Cryptographic Hash Functions (secret-key cryptography) 2012-05-04
Joppe W. Bos (Ecole Polytechnique Fédérale de Lausanne, Switzerland) - On the Cryptanalysis of Public-Key Cryptography (public-key cryptography) 2012-03-29
Roel Peeters (Katholieke Universiteit Leuven, Belgium) - Security Architecture for Things That Think (cryptographic protocols) 2012-07-08
Marc Stevens (Leiden University, the Netherlands) - Attacks on Hash Functions and Applications (secret-key cryptography) 2013-03-01
Nicky Mouha (Katholieke Universiteit Leuven, Belgium) - Automated Techniques for Hash Function and Block Cipher Cryptanalysis (secret-key cryptography) 2012-06-12
Khaled Ouafi (Ecole Polytechnique Fédérale de Lausanne, Switzerland) - Security and Privacy in RFID Systems (cryptographic protocols) 2014-12-20
Sk Subidh (Indian Institute of Technology Kharagpur, India) - Differential Fault Analysis of Block Ciphers (implementation) 2013-09-10
Nicolas Guillermin (University Rennes 1 (France)) - Implémentation matérielle de coprocesseurs haute performance pour la cryptographie asymétrique (implementation) 2012-05-11
Sujoy Sinha Roy (Indian Institute of Technology Kharagpur, India) - Design and Analysis of Elliptic Curve Cryptosystems on FPGAs (implementation) 2012-06-23
Shekh Faisal Abdul-Latip (University of Wollongong, Australia) - Algebraic and Side-Channel Analysis of Lightweight Block Ciphers (secret-key cryptography) 2016-11-16
Pouyan Sepehrdad (Ecole Polytechnique Fédérale de Lausanne, Switzerland) - Statistical and Algebraic Cryptanalysis of Lightweight and Ultra-Lightweight Symmetric Primitives (secret-key cryptography) 2017-04-19
Marcio Juliato (University of Waterloo, Canada) - Fault Tolerant Cryptographic Primitives for Space Applications (applications) 2011-04-16
Ilya Kizhvatov (University of Luxembourg, Luxembourg) - Physical Security of Cryptographic Algorithm Implementations (implementation) 2012-07-08
Jian Guo (Nanyang Technological University, Singapore) - Analysis of Cryptographic Hash Functions (secret-key cryptography) 2015-01-30
Daniel Wichs (New York University, USA) - Cryptographic Resilience to Continual Information Leakage (foundations) 2013-12-03
Abdelaziz Elaabid - Side channel attacks: advanced experimentations on template attacks (secret-key cryptography) 2014-01-27
Billy Bob Brumley (Aalto University School of Science, Finland) - Covert Timing Channels, Caching, and Cryptography (implementation) 2012-06-24
Diego F. Aranha (University of Campinas) - Efficient software implementation of elliptic curves and bilinear pairings (implementation) 2014-03-19
Luk Bettale (University Pierre & Marie Curie, France) - Algebraic Cryptanalysis: Tools and Applications (applications) 2016-01-22
Erik Tews (Technical University of Darmstadt, Germany) - DECT Security Analysis (applications) 2012-06-03
Claudio Orlandi (University of Aarhus, Denmark) - Secure Computation in Untrusted Environments (cryptographic protocols) 2011-04-19
Kwangsu Lee (Korea University, Korea) - Efficient Hidden Vector Encryptions and Its Applications (public-key cryptography) 2014-01-07
Juraj Šarinay (Ecole Polytechnique Fédérale de Lausanne, Switzerland) - Cryptographic Hash Functions in Groups and Provable Properties 2015-04-07
Nishanth Chandran (University of California, Los Angeles (UCLA), United States of America) - Theoretical Foundations of Position-Based Cryptography (cryptographic protocols) 2011-10-25
Ben Smyth (University of Birmingham, United Kingdom) - Formal verification of cryptographic protocols with automated reasoning (cryptographic protocols) 2011-09-27
Miroslav Knezevic (Katholieke Universiteit Leuven, Belgium) - Efficient Hardware Implementations of Cryptographic Primitives (implementation) 2011-08-08
Emiliano De Cristofaro (University of California, Irvine, United States of America) - Sharing Sensitive Information with Privacy (cryptographic protocols) 2011-09-01
Rafi Chen (Technion - Israel Institute of Technology, Israel) - New Techniques for Cryptanalysis of Cryptographic Hash Functions (foundations) 2011-08-10
Gautham Sekar (Katholieke Universiteit Leuven, Belgium) - Cryptanalysis and Design of Symmetric Cryptographic Algorithms (secret-key cryptography) 2011-06-13
Benedikt Gierlichs (Katholieke Universiteit Leuven, Belgium) - Statistical and Information-Theoretic Methods for Power Analysis on Embedded Cryptography 2011-02-13
Carmela Troncoso (Katholieke Universiteit Leuven, Belgium) - Design and analysis methods for privacy technologies (applications) 2011-08-08
Michael Hutter (Graz University of Technology, Austria) - Secure and Efficient Implementation of RFID Tags Supporting Cryptography (implementation) 2011-07-21
Thomas Schneider (Ruhr University Bochum, Germany) - Engineering Secure Two-Party Computation Protocols - Advances in Design, Optimization, and Applications of Efficient Secure Function Evaluation (cryptographic protocols) 2011-09-02
Jeremy Clark (University of Waterloo, Canada) - Democracy Enhancing Technologies: Toward deployable and incoercible E2E elections (applications) 2011-07-19
Santosh Ghosh (Indian Institute of Technology Kharagpur, India) - Design and Analysis of Pairing Based Cryptographic Hardware for Prime Fields (public-key cryptography) 2011-07-10
Patrick Longa (University of Waterloo, Canada) - High-Speed Elliptic Curve and Pairing-Based Cryptography (public-key cryptography) 2011-04-30
Peter Schwabe (Technische Universiteit Eindhoven, The Netherlands) - High-Speed Cryptography and Cryptanalysis (implementation) 2012-01-11
Essam Ghadafi (University of Bristol, United Kingdom) - Practical Privacy-Preserving Cryptographic Protocols (cryptographic protocols) 2012-02-23
Arshad Ali (Royal Holloway, University of London, United Kingdom) - New Attacks on FCSR-based Stream Ciphers (secret-key cryptography) 2011-12-20
Gaetan Bisson (Institut National Polytechnique de Lorraine (France), Eindhoven University of Technology (The Netherlands)) - Endomorphism Rings in Cryptography (foundations) 2012-03-14
Ghada Abdelhady (German University in Cairo, Egypt) - New DES based on Elliptic Curve (secret-key cryptography) 2011-03-16
Christiane Peters (Technische Universiteit Eindhoven, The Netherlands) - Curves, Codes, and Cryptography (public-key cryptography) 2011-12-02
Stefano Tessaro (ETHZ, Switzerland) - Computational Indistinguishability Amplification 2011-04-17
Dominique Schroeder (Technical University of Darmstadt, Germany) - On the Complexity of Blind Signatures (foundations) 2011-04-20
Julia Borghoff (Technical University of Denmark, Denmark) - Cryptanalysis of Lightweight Ciphers (secret-key cryptography) 2012-01-11
Alexandre Berzati (University of Versailles, France) - Cryptographic Analysis of Algorithm Corruptions (implementation) 2011-06-13
Elke De Mulder (Katholieke Universiteit Leuven, Belgium) - Electromagnetic Techniques and Probes for Side-Channel Analysis on Cryptographic Devices (implementation) 2011-08-07
Alptekin Küpçü (Brown University, United States of America) - Efficient Cryptography for the Next Generation Secure Cloud (cryptographic protocols) 2011-04-19
Sebastiaan Indesteege (Katholieke Universiteit Leuven, Belgium) - Analysis and Design of Cryptographic Hash Functions (secret-key cryptography) 2011-08-05
Mohammad Reza Reyhanitabar (University of Wollongong, Australia) - Contributions to the Theory and Application of Cryptographic Hash Functions (foundations) 2011-04-26
S. Dov Gordon (University of Maryland, United States of America) - On Fairness in Secure Computation (cryptographic protocols) 2011-08-08
Vijayakrishnan Pasupathinathan (Macquarie University, Australia) - Hardware-based Identification and Authentication Systems (applications) 2014-12-17
Seung Geol Choi (Columbia University, United States of America) - On Adaptive Security and Round Efficiency in Secure Multi-party Computation (cryptographic protocols) 2012-07-08
Raminder Ruprai (Royal Holloway, University of London, United Kingdom) - Improvements to the Gaudry-Schost Algorithm for Multidimensional discrete logarithm problems and Applications (foundations) 2011-04-17
Martin Geisler (University of Aarhus, Denmark) - Cryptographic Protocols: Theory and Implementation (cryptographic protocols) 2011-04-18
Aniket Kate (University of Waterloo, Canada) - Distributed Key Generation and Its Applications (cryptographic protocols) 2011-04-19
Laurent Sauvage (Télécom ParisTech (Paris, France)) - Cartographie électromagnétique pour la cryptanalyse physique (implementation) 2011-10-29
Florian Mendel (Graz University of Technology, Austria) - Analysis of Cryptographic Hash Functions (secret-key cryptography) 2011-12-07
Rayanki Balakrishna (Sri Krishnadevaraya Univeristy, India) - Multihop Performace Issuess in Wire less Mobile Ad Hoc networks (implementation) 2012-06-05
Mohammad Mahmoody (Princeton University, United States of America) - Studies in the Efficiency and (versus) Security of Cryptographic Tasks (foundations) 2011-04-27
Claude Barral (Ecole Polytechnique Fédérale de Lausanne, Switzerland) - Biometrics & Security: Combining Fingerprints, Smart Cards and Cryptography (applications) 2017-04-19
Ehab Alnfrawy (Cairo University, Egypt) - Towards an Efficient Public Key Cryptosystem (public-key cryptography) 2011-05-16
Chun-Yuan Hsiao (Boston University, USA) - Butterfly Effect in Cryptography: Consequences of Changes in Definitions (foundations) 2011-08-23
Martin Simka (Technical University of Kosice, Slovakia) - Analysis and Implementation of Selected Blocks for Public-Key Cryptosystems in FPGAs (public-key cryptography) 2011-04-27
Selmane Nidhal (Télécom ParisTech (Paris, France)) - Global and local Fault attacks on AES cryptoprocessor: Implementation and Countermeasures (secret-key cryptography) 2011-05-27
Vassilis Zikas (ETHZ, Switzerland) - Generalized Corruption Models in Secure Multi-Party Computation (cryptographic protocols) 2011-06-02
Malakondayya Choudary Gorantla (Queensland University of Technology, Australia) - Design and Analysis of Group Key Exchange Protocols (cryptographic protocols) 2011-06-08
Michael de Mare (Stevens Institute of Technology, USA) - Secure Set Membership Using 3SAT (foundations) 2011-04-22
S. Dov Gordon (University of Maryland, United States of America) - On Fairness in Secure Computation (cryptographic protocols) 2011-08-09
Dmitry Khovratovich (University of Luxembourg, Luxembourg) - New Approaches to the Cryptanalysis of Symmetric Primitives (secret-key cryptography) 2011-04-14
Gil Segev (Weizmann Institute of Science, Israel) - The Design of Public-Key Cryptosystems Resilient to Chosen-Ciphertext and Key-Leakage Attacks (foundations) 2011-04-16
Gaëtan Leurent (Ecole Normale Supérieure, France) - Design and Analysis of Hash Functions (secret-key cryptography) 2011-04-11
Santosh Kumar Yadav (Dr B.R.Ambedkar University, India) - Some Problems in Symmetric and Asymmetric Cryptography (applications) 2011-04-14
Sherman S. M. Chow (New York University, USA) - New Privacy-Preserving Architectures for Identity-/Attribute-Based Encryption (public-key cryptography) 2013-09-10
Santiago Zanella Beguelin (Ecole Nationale Supérieure des Mines de Paris, Paris) - Formal Certification of Game-Based Cryptographic Proofs (foundations) 2011-04-12
Mehreen Afzal (National University of Science and Technology, Pakistan) - Algebraic Cryptanalysis of Stream Ciphers with Non-linear Update (secret-key cryptography) 2011-04-11
Mayank Varia (Massachusetts Institute of Technology, United States of America) - Studies in Program Obfuscation (foundations) 2011-04-16
Martin Vuagnoux (Ecole Polytechnique Fédérale de Lausanne, Switzerland) - Computer Aided Cryptanalysis from Ciphers to Side Channels (cryptographic protocols) 2017-04-19
Victor Lomne (Laboratoire d'Informatique de Robotique et de Microelectronique de Montpellier, France) - Power and Electro-Magnetic Side-Channel Attacks: threats and countermeasures (implementation) 2011-03-03
Yevgeniy Vahlis (University of Toronto, Canada) - Black Box and White Box Cryptography (public-key cryptography) 2011-08-08
Wei Wu (University of Wollongong, Australia) - Cryptographic Protocols with Untrusted Third Party (public-key cryptography) 2011-04-17
Maike Ritzenhofen (Ruhr University Bochum, Germany) - On Efficiently Calculating Small Solutions of Systems of Polynomial Equations : Lattice-based Methods and Applications to Cryptography (public-key cryptography) 2011-09-02
Luca De Feo (Ecole Polytechnique, France) - Fast Algorithms for Towers of Finite Fields and Isogenies (foundations) 2011-02-24
Marcos Antonio Simplicio Junior (Escola Politécnica, University of São Paulo, Brazil) - Message Authentication Algorithms for Wireless Sensor Networks (secret-key cryptography) 2011-02-24
Andrea Röck (Ecole Polytechnique, France) - Quantifying Studies of (Pseudo) Random Number Generation for Cryptography (secret-key cryptography) 2011-04-18
Martin Novotný (Ruhr University Bochum, Germany) - Time-Area Efficient Hardware Architectures for Cryptography and Cryptanalysis (implementation) 2011-04-19
Dalia Khader (University of Bath, United Kingdom) - Attribute based authentication schemes (public-key cryptography) 2011-04-18
Andrey Bogdanov (Ruhr University Bochum, Germany) - Analysis and Design of Block Cipher Constructions (secret-key cryptography) 2011-04-20
Sumanta Chaudhuri (Télécom ParisTech (Paris, France)) - Asynchronous FPGA Architectures for Cryptographic Applications (implementation) 2011-05-07
Atefeh Mashatan (University of Waterloo, Canada) - Message Authentication and Recognition Protocols Using Two-Chanel Cryptography. (cryptographic protocols) 2011-02-16
Vipul Goyal (University of California, Los Angeles (UCLA), United States of America) - Stronger Notions of Secure Computation (foundations) 2011-04-19
Axel Poschmann (Ruhr University Bochum, Germany) - Lightweight Cryptography - Cryptographic Engineering for a Pervasive Worls (implementation) 2011-02-18
Siamak Fayyaz Shahandashti (University of Wollongong, Australia) - Contributions to Secure and Privacy-Preserving Use of Electronic Credentials (public-key cryptography) 2011-04-19
Douglas Stebila (University of Waterloo, Canada) - Classical Authenticated Key Exchange and Quantum Cryptography (cryptographic protocols) 2011-04-14
Markku-Juhani Olavi Saarinen (Royal Holloway, University of London, United Kingdom) - Cryptanalysis of Dedicated Hash Functions (secret-key cryptography) 2011-03-09
Sondre Roenjom (University of Bergen, Norway) - Cryptanalysis of Ciphers over Finite Cyclic Groups (secret-key cryptography) 2011-04-12
Michael Naehrig (Technische Universiteit Eindhoven, The Netherlands) - Constructive and Computational Aspects of Cryptographic Pairings (public-key cryptography) 2011-04-22
Qingsong Ye (Macquarie University, Australia) - Privacy Preserving Dataset Operations (cryptographic protocols) 2011-04-25
Peter Birkner (Technische Universiteit Eindhoven, The Netherlands) - Efficient Arithmetic on Low-Genus Curves (public-key cryptography) 2012-05-25
Crystal Lee Clough (University of Cincinnati, United States of America) - Square: A New Family of Multivariate Encryption Schemes (public-key cryptography) 2011-04-17
Man Ho Allen Au (University of Wollongong, Australia) - Contribution to Privacy-Preserving Cryptographic Techniques (public-key cryptography) 2011-04-16
Brecht Wyseur (Katholieke Universiteit Leuven, Belgium) - White-Box Cryptography (secret-key cryptography) 2011-04-18
Christophe Petit (Université catholique de Louvain, Belgium) - Cryptographic hash functions from expander graphs (secret-key cryptography) 2011-06-09
Joern-Marc Schmidt (Graz University of Technology, Austria) - Implementation Attacks - Manipulating Devices to Reveal Their Secrets (implementation) 2012-11-02
Tim Güneysu (Ruhr University Bochum, Germany) - Cryptography and Cryptanalysis on Reconfigurable Devices (implementation) 2011-02-14
Thomas Gross (Ruhr University Bochum, Germany) - Browser-based Identity Federation (applications) 2011-02-14
Mohamed Layouni (McGill University, Canada) - Privacy-preserving Personal Information Management (cryptographic protocols) 2011-07-03
Xinyi Huang (University of Wollongong, Australia) - A Study of Undeniable Signatures and Their Variants (public-key cryptography) 2011-04-16
Marina Samokhina (Moscow Institute of Physics and Technology (State University), Russia) - The construction and research of cryptographic systems based on linear codes in projective metrics (public-key cryptography) 2013-08-22
Marina Samokhina (Moscow Institute of Physics and Technology (State University), Russia) - cryptographic systems based on linear codes (public-key cryptography) 2017-07-04
V.N.Krishna Addepalli (Acharya Nagarjuna University, India) - Performance Evaluation of New Encryption Algorithms with Emphasis on Probabilistic Encryption & Time Stamp in Network Security (secret-key cryptography) 2011-05-30
Jean-Philippe Aumasson (Ecole Polytechnique Fédérale de Lausanne, Switzerland) - Design and analysis of symmetric cryptographic algorithms (secret-key cryptography) 2011-02-16
Sylvain Pasini (Ecole Polytechnique Fédérale de Lausanne, Switzerland) - Secure communication using authenticated channels (cryptographic protocols) 2011-04-18
Mike Rosulek (University of Illinois, United States of America) - The Structure of Secure Multi-Party Computation (foundations) 2014-12-17
Matthieu Rivain (University of Luxembourg, Luxembourg) - On the Physical Security of Cryptographic Implementations (implementation) 2011-02-14
Berkant Ustaoglu (University of Waterloo, Canada) - Key establishment - security models, protocols and usage (cryptographic protocols) 2011-11-16
Scott Russell (Boston University, USA) - Communication and Query Privacy: Intrusion-Resilient Secure Channels and Private Database Queries (cryptographic protocols) 2011-08-16
Thomas Peyrin (University of Versailles, France) - Analyse de fonctions de hachage cryptographiques (secret-key cryptography) 2011-04-24
Jiqiang Lu (Royal Holloway, University of London, United Kingdom) - Cryptanalysis of block ciphers (secret-key cryptography) 2011-03-09
David Mandell Freeman (University of California, Berkeley, United States of America) - Constructing abelian varieties for pairing-based cryptography (public-key cryptography) 2011-02-16
Stefan Tillich (Graz University of Technology, Austria) - Instruction Set Extensions for Support of Cryptography on Embedded Systems (implementation) 2011-02-18
Mehmet Sabir Kiraz (Technische Universiteit Eindhoven, The Netherlands) - Secure and Fair Two-Party Computation (cryptographic protocols) 2014-05-22
Sven Laur (Helsinki University of Technology, Finland) - Cryptographic Protocol Design (cryptographic protocols) 2011-04-29
Dave Singelee (Katholieke Universiteit Leuven, Belgium) - Study and Design of a Security Architecture for Wireless Personal Area Networks (applications) 2011-08-05
Thomas Baignères (Ecole Polytechnique Fédérale de Lausanne, Switzerland) - Quantitative security of block ciphers: designs and cryptanalysis tools (secret-key cryptography) 2011-02-16
Andy Rupp (Ruhr University Bochum, Germany) - Computational Aspects of Cryptography and Cryptanalysis 2011-02-14
Simon Fischer (Ecole Polytechnique Fédérale de Lausanne, Switzerland) - Analysis of lightweight stream ciphers (secret-key cryptography) 2011-02-16
Waldyr Dias Benits Junior (Royal Holloway, University of London, United Kingdom) - Applications of Fobenius Expansions in Elliptic Curve Cryptography (applications) 2011-04-16
Marko Wolf (Ruhr University Bochum, Germany) - Security Engineering for Vehicular IT Systems — Improving Trustworthiness and Dependability of Automotive IT Applications (applications) 2016-02-13
Vadim Lyubashevsky (University of California, San Diego, United States of America) - Towards Practical Lattice-Based Cryptography (public-key cryptography) 2011-04-16
Rungrat Wiangsripanawan (University of Wollongong, Australia) - Contributions to Mobility and Anonymity in IP Networks (applications) 2011-04-16
Jens Zumbrägel (University of Zurich, Switzerland) - Public-key cryptography based on simple semirings (public-key cryptography) 2012-05-25
Flavio D. Garcia (Radboud University Nijmegen) - Formal and Computational Cryptography: Protocols, Hashes and Commitments (cryptographic protocols) 2012-11-02
Christophe Giraud (University of Versailles, France) - Attacks on embedded cryptosystems and corresponding countermeasures (implementation) 2012-05-09
Amit K Awasthi (Dr B.R.Ambedkar University, India) - A Study of Some Delegated Digital Signature Schemes (cryptographic protocols) 2011-04-11
Julien Bringer (Université du Sud Toulon, France) - Nonlinearity of boolean functions: cryptographic applications of boolean functions and coding theory 2011-05-17
Mark Manulis (Ruhr University Bochum, Germany) - Provably Secure Group Key Exchange (cryptographic protocols) 2011-11-03
Kerstin Lemke-Rust (Ruhr University Bochum, Germany) - Models and Algorithms for Physical Cryptanalysis (implementation) 2011-04-30
Côme Berbain (University of Paris 7 - Denis Diderot, France) - Analyse et conception d'algorithmes de chiffrement à flot (secret-key cryptography) 2012-05-17
Joern Schweisgut (Justus-Liebig-Universität Gießen, Germany) - Elektronische Wahlen unter dem Einsatz kryptografischer Observer - Electronic Elections with Cryptographic Observers (cryptographic protocols) 2011-02-16
Christophe Tartary (Macquarie University, Australia) - Authentication for Multicast Authentication (cryptographic protocols) 2014-12-15
Kazuo Sakiyama (The University of Electro-Communications, Japan) - Secure Design Methodology and Implementation for Embedded Public-key Cryptosystems (implementation) 2012-04-26
Shien Jin Ong (Harvard University, United States of America) - Unconditional Relationships within Zero Knowledge (foundations) 2011-04-20
Ulrich Huber (Ruhr University Bochum, Germany) - On Broadcast Encryption for Secure Software Delivery to Automobiles (cryptographic protocols) 2011-03-01
Sylvain Guilley (Télécom ParisTech (Paris, France)) - Geometrical Countermeasures to Side-Channel Attacks (implementation) 2011-10-29
Andrew V. Sutherland (Massachusetts Institute of Technology, United States of America) - Order Computations in Generic Groups (foundations) 2011-04-27
Stephen Weis (Massachusetts Institute of Technology, United States of America) - New Foundations for Efficient Authentication, Commutative Cryptography, and Private Disjointness Testing (foundations) 2011-02-15
Yi Lu (Ecole Polytechnique Fédérale de Lausanne, Switzerland) - Applied Stream Ciphers in Mobile Communications (secret-key cryptography) 2017-04-19
Pierre-Yvan Liardet (Laboratoire d'Informatique de Robotique et de Microelectronique de Montpellier, France) - Ingénierie cryptographique Implantations sécurisées (implementation) 2011-02-14
Alejandro Hevia (University of California, San Diego, United States of America) - Anonymity and Independence in Multiparty Protocols (cryptographic protocols) 2011-04-19
Debdeep Mukhopadhyay (Indian Institute of Technology Kharagpur, India) - Design and Analysis of Cellular Automata Based Cryptographic Algorithms (secret-key cryptography) 2011-08-05
Dominique Unruh (University of Karlsruhe, Germany) - Protokollkomposition und Komplexität (Protocoll Composition and Complexity) (foundations) 2011-04-17
Jean Monnerat (Ecole Polytechnique Fédérale de Lausanne, Switzerland) - Short Undeniable Signatures: Design, Analysis, and Applications (public-key cryptography) 2017-04-19
Ben Adida (Massachusetts Institute of Technology, United States of America) - Advances in Cryptographic Voting Systems (cryptographic protocols) 2011-02-15
Jan Pelzl (Ruhr University Bochum, Germany) - Practical Aspects of Curve-Based Cryptography and Cryptanalysis (public-key cryptography) 2011-04-18
Elad Barkan (Technion - Israel Institute of Technology, Israel) - Cryptanalysis of Ciphers and Protocols (secret-key cryptography) 2011-04-17
Chris Peikert (Massachusetts Institute of Technology, United States of America) - Cryptographic Error Correction (foundations) 2011-04-16
Turki F. Al-Somani (King Fahd University of Petroleum & Minerals (KFUPM), Saudia Arabia) - Design and Analysis of Efficient and Secure Elliptic Curve Cryptoprocessors (public-key cryptography) 2011-04-17
Robert Granger (University of Bristol, United Kingdom) - On Small Degree Extension Fields in Cryptology (public-key cryptography) 2014-09-07
Sandeep S. Kumar (Ruhr University Bochum, Germany) - Elliptic Curve Cryptography for Constrained Devices (implementation) 2011-04-18
Souradyuti Paul (Katholieke Universiteit Leuven, Belgium) - Design and Analysis of Stream Ciphers Based on Arrays and Modular Addition (secret-key cryptography) 2011-12-11
Deepak Kumar Dalai (Indian Statistical Institute, India) - On Some Necessary Conditions of Boolean Functions to Resist Algebraic Attacks (secret-key cryptography) 2011-04-20
Susan Hohenberger (Massachusetts Institute of Technology, United States of America) - Advances in Signatures, Encryption, and E-Cash from Bilinear Groups 2011-04-25
Kevin Fu (Massachusetts Institute of Technology, United States of America) - Integrity and access control in untrusted content distribution networks (implementation) 2011-05-20
Dwaine Clarke (Massachusetts Institute of Technology, United States of America) - Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data 2014-07-15
Simon L. Garfinkel (Massachusetts Institute of Technology, United States of America) - Design Principles and Patterns for Computer Systems That Are Simultaneously Secure and Usable 2011-04-25
Phan Duong Hieu (Ecole Normale Supérieure, France) - Sécurité et efficacité de schémas cryptographiques (public-key cryptography) 2012-03-20
Christopher Wolf (Katholieke Universiteit Leuven, Belgium) - Multivariate Quadratic Polynomials in Public Key Cryptography (public-key cryptography) 2011-02-12
Gildas Avoine (Ecole Polytechnique Fédérale de Lausanne, Switzerland) - Cryptography in Radio Frequency Identification and Fair Exchange Protocols (cryptographic protocols) 2017-04-19
Ludovic Perret (Marne-la-Vallée university) - Algebraic and Combinatorial Tools for Public Key Cryptography (public-key cryptography) 2014-12-25
Pascal Junod (Ecole Polytechnique Fédérale de Lausanne, Switzerland) - Statistical cryptanalysis of block ciphers (secret-key cryptography) 2014-12-25
Olivier Billet (University of Versailles, France) - Cryptologie multivariable 2014-12-22
Nicolás González-Deleito (Universite Libre de Bruxelles, Belgium) - Trust relationships in exchange protocols (cryptographic protocols) 2012-05-14
Nicolás González-Deleito (Universite Libre de Bruxelles, Belgium) - Trust relationships in exchange protocols (cryptographic protocols) 2012-05-14
Gilles Piret (Université catholique de Louvain, Belgium) - Block Ciphers: Security Proofs, Cryptanalysis, Design, and Fault Attacks (secret-key cryptography) 2012-05-08
Eike Kiltz (Ruhr University Bochum, Germany) - Complexity Theoretic Lower Bounds on Cryptographic Functions (foundations) 2012-11-02
Anderson C. A. Nascimento (University of Tokyo) - Bounds and Constructions for Mutually Distrustful Information Theoretically Secure Cryptographic Protocols (foundations) 2014-12-15
Moses Liskov (Massachusetts Institute of Technology, United States of America) - New Tools in Cryptography: Mutually Independent Commitments, Tweakable Block Ciphers, and Plaintext Awareness via Key Registration 2011-04-25
Jonathan Herzog (Massachusetts Institute of Technology, United States of America) - Computational Soundness for Standard Assumptions of Formal Cryptography 2011-04-25
Andre Weimerskirch (Ruhr University Bochum, Germany) - Authentication in Ad-hoc and Sensor Networks (cryptographic protocols) 2011-04-17
Pradeep Kumar Mishra (Indian Statistical Institute, India) - Studies on Efficient and Secure Implementation of Elliptic and Hyperelliptic Curve Cryptosystems (public-key cryptography) 2011-08-20
Eric Bone (Brandeis University, United States of America) - A Generalization of Pohlig-Hellman Simplification in Elliptic Curve Cryptography (public-key cryptography) 2011-05-14
Jens Groth (University of Aarhus, Denmark) - Honest Verifier Zero-Knowledge Arguments Applied (foundations) 2011-09-04
Paulo S. L. M. Barreto (Escola Politécnica, University of São Paulo, Brazil) - Criptografia robusta e marcas d'água frágeis: construção e análise de algoritmos para localizar alterações em imagens digitais (public-key cryptography) 2011-02-24
Elisabeth Oswald (Graz University of Technology, Austria) - On Side-Channel Attacks and the Application of Algorithmic Countermeasures (implementation) 2014-09-21
Alexander May (University Paderborn, Germany) - New RSA Vulnerabilities Using Lattice Reduction Methods (public-key cryptography) 2013-07-06
Sébastien Canard (Université de Caen Basse-Normandie, France) - Group signatures, variants and applications (cryptographic protocols) 2011-03-08
Jeroen Doumen (Technische Universiteit Eindhoven, The Netherlands) - Some Applications of Coding Theory in Cryptography 2013-07-01
Liam Keliher - Linear Cryptanalysis of Substitution-Permutation Networks (secret-key cryptography) 2015-05-09
Frederik Vercauteren (Katholieke Universiteit Leuven, Belgium) - Computing zeta functions of curves over finite fields (foundations) 2011-04-19
Anna Lysyanskaya (Massachusetts Institute of Technology, United States of America) - Signature Schemes and Applications to Cryptographic Protocol Design (public-key cryptography) 2011-04-19
Jonathan Katz (Columbia University, United States of America) - Efficient Cryptographic Protocols Preventing Man-in-the-Middle Attacks (cryptographic protocols) 2011-07-21
Marc Fischlin (Department of Mathematics, Goethe Universität Frankfurt, Germany) - Trapdoor Commitment Schemes and Their Applications (foundations) 2017-03-31
Willy Susilo (University of Wollongong, Australia) - Contributions to Fail-Stop Signature Schemes (public-key cryptography) 2011-04-17
Pierre-Alain Fouque (University of Paris 7 - Denis Diderot, France) - Le partage de clés cryptographiques: Théorie et Pratique 2011-04-19
Olivier Markowitch (Universite Libre de Bruxelles, Belgium) - Non-repudiation protocols (cryptographic protocols) 2012-05-28
Michel Abdalla (University of California, San Diego, United States of America) - Design and Analysis of Secure Encryption Schemes 2016-11-25
Francois Koeune (Université catholique de Louvain, Belgium) - Careful design and integration of cryptographic primitives with contributions to timing attack, padding schemes and random number generators 2011-06-09
Zulfikar Ramzan (Massachusetts Institute of Technology, United States of America) - A Study of Luby-Rackoff Ciphers 2011-04-25
Leonid Reyzin (Massachusetts Institute of Technology, United States of America) - Zero-Knowledge with Public Keys (foundations) 2011-08-03
Stanislaw Jarecki (Massachusetts Institute of Technology, United States of America) - Efficient Threshold Cryptosystems 2011-04-25
Yevgeniy Dodis (Massachusetts Institute of Technology, United States of America) - Exposure-Resilient Cryptography 2013-08-22
Victor Boyko (Massachusetts Institute of Technology, United States of America) - On All-or-Nothing Transforms and Password-Authenticated Key Exchange Protocols 2011-04-25
Helger Lipmaa (University of Tartu, Estonia) - Secure and Efficient Time-Stamping Systems (applications) 2011-02-14
Seungjoo Kim (Sungkyunkwan University, South Korea) - Improved privacy and authenticity in digital signatures / key management (cryptographic protocols) 2016-01-22
Salil Vadhan (Massachusetts Institute of Technology, United States of America) - A Study of Statistical Zero-Knowledge Proofs (foundations) 2011-04-20
Henri Gilbert (University Paris 11 - Orsay) - Cryptanalyse des algorithmes de chiffrement symétrique (secret-key cryptography) 2014-12-10
Marc Joye (Université catholique de Louvain, Belgium) - Security analysis of RSA-type cryptosystems (public-key cryptography) 2011-02-14
Christian Cachin (ETHZ, Switzerland) - Entropy Measures and Unconditional Security in Cryptography (foundations) 2011-05-30
Vincent Rijmen (Katholieke Universiteit Leuven, Belgium) - Cryptanalysis and design of iterated block ciphers (secret-key cryptography) 2011-08-05
Tolga Acar (Oregon State University, USA) - High-Speed Algorithms & Architectures For Number-Theoretic Cryptosystems (implementation) 2012-04-18
Amos Beimel (Technion - Israel Institute of Technology, Israel) - Secure Schemes for Secret Sharing and Key Distribution (foundations) 2012-04-26
David Pointcheval (Université de Caen Basse-Normandie, France) - Proofs of Knowledge and Security Proofs (Les Preuves de Connaissance et leurs Preuves de Sécurité) (public-key cryptography) 2011-04-16
Serge Vaudenay (University of Paris 7 - Denis Diderot, France) - The Security of Cryptographic Primitives (secret-key cryptography) 2014-12-25
Joan Daemen (Katholieke Universiteit Leuven, Belgium) - Cipher and hash function design - Strategies based on linear and differential cryptanalysis (secret-key cryptography) 2013-09-10
Bart Preneel (Katholieke Universiteit Leuven, Belgium) - Analysis and Design of Cryptographic Hash Functions (secret-key cryptography) 2011-04-18
Alfred Menezes (University of Waterloo, Canada) - Elliptic Curve Cryptosystems (public-key cryptography) 2011-04-16
Rafail Ostrovsky (Massachusetts Institute of Technology, United States of America) - Software Protection and Simulation on Oblivious RAMs. (foundations) 2011-04-16
Dong Hoon Lee (The University of Oklahoma, USA) - 2014-01-05
Nigel Smart (University of Kent at Canterbury, United Kingdom) - Computer Solution of Diophantine Equations 2012-02-23
Marc Girault (Université de Caen Basse-Normandie, France) - Analysis and design of cryptographic and data coding algorithms (public-key cryptography) 2011-06-20
Jacques Patarin (Université Paris 6) - Étude des générateurs de permutations pseudo-aléatoires basés sur le schéma du D.E.S. (secret-key cryptography) 2014-12-20
Ingrid Verbauwhede (Katholieke Universiteit Leuven, Belgium) - VLSI Design Methodologies for the ASIC realization of cryptographic and algebraic systems 2013-12-03
Phillip Rogaway (Massachusetts Institute of Technology, United States of America) - The Round Complexity of Secure Protocols (foundations) 2013-07-01
Claude Crépeau (Massachusetts Institute of Technology, United States of America) - Correct and Private Reduction among Oblivious Transfers (cryptographic protocols) 2011-04-16
Ueli Maurer (ETHZ, Switzerland) - 2011-02-13
Moti Yung (Columbia University, United States of America) - Minimum Knowledge-Transfer Protocols (foundations) 2012-05-08
Burton Stephen Kaliski Jr. (Massachusetts Institute of Technology, United States of America) - Elliptic Curves and Cryptography: A Pseudorandom Bit Generator and Other Tools (public-key cryptography) 2011-04-22
Josh Benaloh (Yale University, United States of America) - Verifiable Secret-Ballot Elections (cryptographic protocols) 2011-04-16
Rene Peralta (University of California, Berkeley, United States of America) - Three Results in Number Theory and Cryptography: 1. A New Algorithm to Compute Square Roots Modulo A Prime Number. 2. On the Bit Complexity of the Discrete Logarithm. 3. A Framework for the Study of Cryptoprotocols (foundations) 2011-04-17
Gilles Brassard (Cornell University, USA) - Relativized cryptography (foundations) 2012-05-12
Albrecht Beutelspacher - Teilfaserungen und Parallelismen in endlichdimensionalen projektiven Räumen 2011-02-13
Lothrop Mittenthal (University of California, Los Angeles (UCLA), United States of America) - Operator-Valued Polynomials in a Complex Variable, and, Generalizations of Spectral Theory (foundations) 2011-04-28
Claude Elwood Shannon (Massachusetts Institute of Technology, United States of America) - An Algebra for Theoretical Genetics (foundations) 2011-05-20
San Ling - 2014-06-21
Lutz Wegner - 2014-01-06
Sundar Lal - 2011-04-11
Sourav Sen Gupta (Indian Statistical Institute, India) - Analysis and Implementation of RC4 Stream Cipher (secret-key cryptography) 2014-03-18
Daejoon Hwang - 2011-03-20
Jongin Lim - 2011-03-20
Jinwook Chung - 2011-03-20
Claude Carlet - 2014-01-27
Sungjun Park - 2011-03-20
Michel Robert - 2011-03-03
Ferucio Laurentiu Tiplea - 2014-01-26
Ashraf Masood - 2011-04-12
Adrian Atanasiu - 2014-01-26
Julio Cesar López Hernández - 2014-03-18
Amr Youssef - 2014-01-05
Alex Biryukov - 2011-04-14 H.C.A. van Tilborg - 2013-07-01
David Peleg - 2013-06-30
Silvio Micali (University of California, Berkeley, United States of America) - 2013-07-01
Avishai Wool (Weizmann Institute of Science, Israel) - Quorum Systems for Distributed Control Protocols (foundations) 2013-06-30
Dan Simmons - 2013-05-30
Dan Wilson - 2013-05-30
Martin M. Lauridsen (Technical University of Denmark, Denmark) - Lightweight Cryptography (secret-key cryptography) 2013-06-10
Hao Chen - 2013-06-10
Debrup Chakraborty - 2013-05-30
Kester, Quist-Aphetsi (University of Brest, France) - A new crytographic and watermarking approaches for the safety and security of electronic data exchange 2017-03-31
Michael Fischer - 2011-04-16
Sunder Lal - 2011-04-14
Jie Wang (Boston University, USA) - Polynomial Time Creativity and its Applications (P-Creativity) 2014-01-05
Steven D. Galbraith - 2011-04-16
Emmanuelle Encrenaz - 2014-01-05
Bruno Robisson - 2014-01-05
A.Vinaya Babu - 2013-05-30
Victor Shoup (University of Wisconsin–Madison) - Removing Randomness from Computational Number Theory (foundations) 2013-09-10
Scott Vanstone - 2011-04-16
Daniele Micciancio - 2011-04-16
Ran Canetti - 2011-04-16
Joachim von zur Gathen - 2011-02-18
George Summers (University of California, San Diego, United States of America) - Cryptographic Systems 2014-05-22
Han Vinck - 2011-02-14
Christof Paar (University of Essen, Germany) - Efficient VLSI Architectures for Bit-Parallel Computation in Galois Fields 2011-04-18
Antigoni Polychroniadou (University of Aarhus, Denmark) - On the Communication and Round Complexity of Secure Computation (cryptographic protocols) 2017-07-25
Russell Bradford - 2011-04-18
Mati Tombak - 2011-02-14
Gilles Barthe - 2011-02-14
Kenneth Ribet - 2011-02-16
Edward Schaefer - 2011-02-16
Willi Meier - 2011-02-16
Jean-Jacques Quisquater - 2011-02-14
Serge Vaudenay - 2017-04-19
Jörg Schwenk (Justus-Liebig-Universität Gießen, Germany) - 2011-02-13
Ahmad-Reza Sadeghi - 2011-02-11
Benny Pinkas - 2011-02-13
Birgit Pfitzmann - 2011-02-14
Luí­s T. A. N. Brandão (Carnegie Mellon University and Universidade de Lisboa) - The Forge-and-Lose Technique and Other Contributions to Secure Two-Party Computation with Commitments (cryptographic protocols) 2017-04-07
Johannes Blömer - 2011-02-10
Claus-Peter Schnorr - 2011-02-10
Jesper Buus Nielsen (University of Aarhus, Denmark) - On Protocol Security in the Cryptographic Model 2016-11-16
Jacques Stern - 2011-02-14
Jean-Sebastien Coron (Ecole Polytechnique, France) - Cryptanalysis and security proofs of public-key schemes. (public-key cryptography) 2011-02-14
Damien Vergnaud - 2015-05-04
Edlyn Teske - 2011-02-15
John Merriman - 2011-02-22
Ian Goldberg - 2011-04-19
J. C. Migliore - 2014-06-25
Charles Bouillaguet (Ecole Normale Supérieure, France) - Some attacks against hardness assumptions and cyptographic primitives 2011-03-14
Karine Heydemann - 2014-12-09
Zubair Naqvi (University of Maryland, United States of America) - Security using Cryptographic Systems in Banks (public-key cryptography) 2014-05-26
Fathy Helail - 2011-03-16
Wafik Lotfallah - 2011-03-16
Tor Helleseth - 2011-04-12
Michele Mosca - 2011-04-14
Éric Schost - 2011-02-24
Josef Pieprzyk - 2014-12-17
François Morain - 2011-02-24
Hae Yong Kim - 2011-02-16
Jayaprakash Kar (Utkal University, India) - Algorithms for Cryptographic Protocols Using Elliptic Curve Cryptography (cryptographic protocols) 2011-03-14
Karl Christian Posch - 2011-02-16
Keith Martin - 2011-02-20
Philippe Maurine - 2011-03-03
Hideki Imai - 2014-12-15
Miklos Santha - 2014-12-10
Chris Mitchell - 2011-03-09
Reinhard Posch - 2014-09-21
Dongho Won - 2011-03-20
Moni Naor - 2011-04-16
Pierrick Gaudry - 2012-03-14
Kaisa Nyberg - 2011-04-29
Jean-Luc Danger - 2011-05-03
Ernst Gabidulin - 2011-06-01
Fred Diamond (Princeton University, United States of America) - 2011-05-14
Berry Schoenmakers - 2011-10-13
Yves Mathieu - 2011-10-29
Srinivas Devadas - 2011-05-05
Benny Chor - 2011-05-09
Goutam Paul (Jadavpur University, India) - Analysis and Design of RC4 and Its Variants (secret-key cryptography) 2011-09-20
Mark D. Ryan (Department of Computing, Imperial College, London, United Kingdom) - Ordered Presentations of Theories: A Hierarchical Approach to Default Reasoning 2011-09-27
Aly A. Fahmy - 2011-05-16
Angus E. Taylor - 2011-04-28
Boaz Barak - 2011-04-27
Daniel J. Bernstein - 2011-04-25
Arjen K. Lenstra - 2013-05-30
Djiby Sow - Semi-modules 2013-09-10
Ronald Linn Rivest - 2011-04-22
Bogdan Warinschi - 2012-02-23
Tanja Lange - 2012-01-11
Rebecca Wright (Yale University, United States of America) - Achieving Perfect Secrecy Using Correlated Random Variables (foundations) 2011-04-22
Yi Mu - 2011-04-27
Drutarovsky Milos (Technical University of Kosice, Slovakia) - Signal Processors in Digital Signal Processing 2011-04-27
Fischer Viktor (Technical University of Kosice, Slovakia) - Fast Methods of Digital Image Segmentation 2011-04-27
Habib Mehrez - (implementation) 2011-12-04
Mohamed M. Abd-Eldayem - 2011-05-16
Hans Ulrich Simon - 2011-09-02
Claudia Diaz (Katholieke Universiteit Leuven, Belgium) - 2011-08-08
Louis Goubin - 2011-06-13
Dr. Ratna Dutta (Indian Statistical Institute, Kolkata, India, INDIA) - Studies on Pairing-Based and Constant Round Dynamic Group Key Agreement Protocols 2015-07-28
Thomas A. Schmidt - 2011-06-19
Roel Peeters (Katholieke Universiteit Leuven, Belgium) - Study and Design of a Security Architecture for Things That Think (cryptographic protocols) 2011-08-05
Rene Govaerts - 2011-08-05
Joos Vandewalle - 2011-08-05
Gokay Saldamli (Oregon State University, USA) - Spectral Modular Arithmetic (public-key cryptography) 2011-06-29
Cetin K. Koc - 2011-06-19
Stefan Brands - 2011-07-03
Dipanwita Roychowdhury - 2011-07-10
Jean-Pierre Tignol - 2011-06-09
Yoni De Mulder (Katholieke Universiteit Leuven, Belgium) - Design and Cryptanalysis of White-Box Implementations 2011-08-08
Jens Hermans (Katholieke Universiteit Leuven, Belgium) - Lightweight public-key cryptography (public-key cryptography) 2011-08-29
Philippe Langevin - 2011-05-17
Frans Kaashoek - 2011-05-20
Gene Tsudik - 2011-08-30
Frank Lauren Hitchcock - 2011-05-20
Palash Sarkar - 2011-08-20
Ero Balsa (Katholieke Universiteit Leuven, Belgium) - Privacy in online social networks: analysis and solutions (applications) 2011-08-20
Anthony Van Herrewege (Katholieke Universiteit Leuven, Belgium) - Security components for trusted computer systems (implementation) 2011-08-16
Colin Boyd - 2011-06-08
Juan González Nieto - 2011-06-08
Bart Mennink (Katholieke Universiteit Leuven, Belgium) - Provable Security of Symmetric Primitives (secret-key cryptography) 2011-08-09
Urs Hengartner - 2011-07-19
Lars Ramkilde Knudsen - 2012-01-11
Endre Bangerter - 2013-05-30
Catherine Gebotys - 2011-04-16
Rei Safavi-Naini - 2011-04-16
Benoit Feix - 2012-11-02
Christophe Clavier - 2012-11-02
Karim Belabas - 2012-11-02
Tsz Hon Yuen (University of Wollongong, Australia) - Contributions to Pairing-based Cryptography (public-key cryptography) 2011-04-16
Eli Biham - 2011-04-17
Tal Malkin - 2012-07-08
Alaaeldin A. Amin - 2011-04-17
Manuel Blum - 2011-04-17
Karim Belabas - 2012-11-02
Bart Jacobs - 2012-11-02
Jaap-Henk Hoepman - 2012-11-02
Ulrich Ultes-Nitsche - 2013-05-30
Christian Rechberger - 2013-06-10
Mehrdad Nojoumian (University of Waterloo, Canada) - Novel Secret Sharing and Commitment Schemes for Cryptographic Applications (cryptographic protocols) 2016-11-16
Douglas Stinson - 2013-05-30
Yang Li (The University of Electro-Communications, Japan) - New Fault-Based Physical Attacks and Their Countermeasures (implementation) 2013-01-06
M.L. Valarmathi - 2011-04-16
Richard Brent - 2012-11-02
Brigitte Vallée (Université de Caen Basse-Normandie, France) - 2011-04-16
Huaxiong Wang - 2014-12-15
Hans Dobbertin (University of Hanover) - Verfeinerungsmonoide, Vaught Monoide und Boolesche Algebren 2012-11-02
Charles Rackoff - 2011-04-16
Thomas Beth - 2011-04-17
Benne de Weger - 2012-11-02
John E. Hopcroft - 2012-05-12
Sylvain Duquesne - 2012-05-11
Renaud Pacalet - 2011-04-19
Ludovic Perret - 2012-05-11
Jean-Charles Faugère - 2012-05-11
Yves Roggeman - 2012-05-08
Jan Denef - 2011-04-19
Jan Schmidt - 2011-04-19
Shafi Goldwasser - 2011-04-20
Chiu Yuen Koo (University of Maryland, United States of America) - Studies on Fault-Tolerant Broadcast and Secure Computation (cryptographic protocols) 2011-04-20
Subhamoy Maitra - 2011-04-20
Amit Sahai (Massachusetts Institute of Technology, United States of America) - 2011-04-19
Nicolas Sendrier - 2011-04-18
Ronald Cramer - 2012-11-02
Manoj Prabhakaran - 2011-04-17
Michael Loui - 2011-04-17
Xiaotie Deng - 2011-04-17
Joachim Rosenthal - 2012-05-25
Duncan S. Wong - 2011-04-17
Guomin Yang (City University of Hong Kong, Hong Kong) - Security and Privacy in Wireless and Roaming Networks (cryptographic protocols) 2011-04-17
U. Rajeswar Rao - 2012-06-05
Jintai Ding - 2011-04-17
Johannes Buchmann - 2012-06-03
Ivan Damgård - 2011-09-04
Michael Sipser - 2011-04-22

Contact: phds (at)

[ IACR home page ] [ IACR PhDs page ] © IACR