Feb 14, 2024 · 1 - Cryptography: samples of publications. PHD THESES. W. Beullens, The Design and Cryptanalysis of Post-Quantum Digital Signature Algorithms, PhD thesis, KU Leuven, 2021; C. Bootland, Efficiency and security aspects of lattice-based cryptography, PhD thesis, KU Leuven, 2021; C. Li, New Methods for Symmetric Cryptography, PhD thesis, KU Leuven ... ... needed. For this reason, NIST has started a Lightweight Cryptography Project to standardize lightweight algorithms. In this thesis, we first explain what lightweight cryptography is, along with its target devices and performance metrics and give two examples of lightweight algorithms, block cipher PRESENT and stream cipher TRIV-IUM. After that ... ... For a BSc thesis, the form is available from the Studienfachberatung. For a MSc thesis, follow the JMCS process. Presentation. Every thesis must be presented near the completion or at the end of the project. Usually this occurs during the semester, within the regular seminar organized by the Cryptology and Data Security group. ... Cryptography [2]. The two men were also helped by Ralph Merkle [18]. These men introduced public key cryptography. Definition 1. Public keycryptography is a type of asymmetric key cryptography, meaning that there exist both a public and private key for the two parties involved. An illustration of how public key cryptography works, from [15 ... ... 6 days ago · At the Applied Cryptography Group, we like analyzing cryptography "in the wild" [1]: we look at cryptographic systems that have been proposed as standards, or are used and deployed in practice, and study their security. In this free-form Master's thesis, bring a cryptographic application that you are interested in breaking or analyzing. ... May 6, 2023 · algorithms, are at risk of being compromised. This thesis aims to analyze and research potential post-quantum encryption algorithms that could potentially replace the traditional algorithms in the existing public key infrastructure. The thesis utilizes observation and applied methods in the field of cyber security to ... What is security and what makes a cryptosystem secure? This thesis explores these questions by looking at the components of a couple public-key cryptosystems and digital signature schemes, attacks against them, and ways of improving security. ... If you consider writing a Bachelor or Master thesis with our group, please send us an email (thesis@cx.tu-…) in which you outline: The cryptography and/or IT security courses you have successfully attended; Any additional skills that might be relevant (e.g., your aptitude for math, knowledge of programming or formal verification languages, …) ... ">
IMAGES
COMMENTS
A Master thesis should have substantial knowledge in at least one sub-field of security or cryptography, and they should have prior experience with the research methodology they plan to use. The default language for Master theses is English. We only supervise student from TU Darmstadt. In exceptional cases we supervise Master students at a company.
International Conference on Security and Cryptography (SECRYPT'22) Author : Christopher van der Beets Accelerating Multi-Server Private Information Retrieval using GPUs
Feb 14, 2024 · 1 - Cryptography: samples of publications. PHD THESES. W. Beullens, The Design and Cryptanalysis of Post-Quantum Digital Signature Algorithms, PhD thesis, KU Leuven, 2021; C. Bootland, Efficiency and security aspects of lattice-based cryptography, PhD thesis, KU Leuven, 2021; C. Li, New Methods for Symmetric Cryptography, PhD thesis, KU Leuven ...
needed. For this reason, NIST has started a Lightweight Cryptography Project to standardize lightweight algorithms. In this thesis, we first explain what lightweight cryptography is, along with its target devices and performance metrics and give two examples of lightweight algorithms, block cipher PRESENT and stream cipher TRIV-IUM. After that ...
For a BSc thesis, the form is available from the Studienfachberatung. For a MSc thesis, follow the JMCS process. Presentation. Every thesis must be presented near the completion or at the end of the project. Usually this occurs during the semester, within the regular seminar organized by the Cryptology and Data Security group.
Cryptography [2]. The two men were also helped by Ralph Merkle [18]. These men introduced public key cryptography. Definition 1. Public keycryptography is a type of asymmetric key cryptography, meaning that there exist both a public and private key for the two parties involved. An illustration of how public key cryptography works, from [15 ...
6 days ago · At the Applied Cryptography Group, we like analyzing cryptography "in the wild" [1]: we look at cryptographic systems that have been proposed as standards, or are used and deployed in practice, and study their security. In this free-form Master's thesis, bring a cryptographic application that you are interested in breaking or analyzing.
May 6, 2023 · algorithms, are at risk of being compromised. This thesis aims to analyze and research potential post-quantum encryption algorithms that could potentially replace the traditional algorithms in the existing public key infrastructure. The thesis utilizes observation and applied methods in the field of cyber security to
What is security and what makes a cryptosystem secure? This thesis explores these questions by looking at the components of a couple public-key cryptosystems and digital signature schemes, attacks against them, and ways of improving security.
If you consider writing a Bachelor or Master thesis with our group, please send us an email (thesis@cx.tu-…) in which you outline: The cryptography and/or IT security courses you have successfully attended; Any additional skills that might be relevant (e.g., your aptitude for math, knowledge of programming or formal verification languages, …)