Supervised Master and Diploma Theses
A.A. B. | Cryptographic analysis of the messenger Olvid | 04/2024 |
J. F. | Robust Combiners for Blind Signatures | 01/2024 – 07/2024 |
S. W. | Key Derivation Functions: Extraction Step with Fixed Salt Values | 01/2024 - |
J.M. H. | Session Identifiers in the UC-Model | 12/2023 – 06/2024 |
J. M. | Analysis of PQ-EAC protocol using Tamarin | 12/2023 – 07/2024 |
T. D. | Authenticated Key Exchange Security of Signal's PQXDH Protocol | 10/2023 – 04/2024 |
K. K. | Benchmarking PQC Algorithms on SoloKeys | 09/2023 – 03/2024 |
M. H. | On the Machine Learning-based Differential Cryptanalysis of Lightweight Block Ciphers | 01/2023 – 06/2023 |
T. K. | Bitcoin Netwerktopologieerkennung durch Timing-Analyse | 11/2023 – 03/2023 |
Y.M. | Security of the NIST SP800 108r1 Key Derivation Functions | 11/2022 – 04/2023 |
C.-M. N.A. | Overview of key establishmend in Wi-Fi | 07/2022 – 12/2022 |
E.E. K. | Analyse von Angriffen auf Multivariate PKE und KEM im Nist Prozess | 06/2022 – 12/2022 |
A.R. | Untersuchung neuer Signaturverfahren auf Buff-Eigenschaften | 06/2022 – 02/2023 |
J.R. | Two Proofs of Black-Box Impossibility of Collision Resistance from One-Wayness | 01/2022 – 09/2022 |
B.J.B. | MitM-Attack on Ternary LWE-Keys with O(n) Qubits | 05/2022 – 08/2022 |
S.C. | Post-Quantum Asynchronous Remote Key Generation | 01/2022 – 07/2022 |
L.I. | Bessere Phishing-Erkennung mittels Tool-Support – Analyse Existierend prototypische Umsetzung eines Erweiterungskonzepts für TORPEDO | 05/2021 – 12/2021 |
L.B. | Backdoored Hash Functions: Immunizing Hash-Based Signatures | 04/2021 – 08/2021 |
S.R.M. | Development of an integration and debugging process for a service-oriented architecture of automated vehicles | 12/2020 – 06/2021 |
M.C. | Shifting to a state-of-the-art password policy: A communication and training approach to increas employees' password security | 10/2020 – 06/2021 |
N.N. | From Perimeter Security to Zero Trust Networks using Service Meshes | 03/2020 – 09/2020 |
C.B. | Development and analysis of a secure and usable data backup system for privacy friendly apps | 02/2020 – 08/2020 |
R.F. | Advanced Security Notions for (Post-Quantum) Signature Schemes | 11/2019 – 04/2020 |
O.K. | Analysis of Bluetooth „Secure Simple Pairing“ with Tamarin | 12/2019 – 11/2020 |
A.A. | Authenticated Encryption for S3 Object Storage Systems | 12/2018 – 05/2019 |
M.H. | Cryptographic Analysis of the Bitmessage Protocol | 06/2018 – 12/2018 |
R.K. | Zero-Knowledge Contingent Payments | 11/2017 – 05/2018 |
F.R. | Complexity-theoretic Implications of Indistinguishability Obfuscation | 04/2017 – 10/2017 |
A.E. | A Construction for an Extremely Lossy Function based on the Learning With Errors Problem | 04/2017 – 09/2017 |
S.J. | Secure Computation in MapReduce | 10/2016 – 04/2017 |
R.E. | Analysis of the MTProto Protocol | 10/2015 – 03/2016 |
T.W. | Combiners for Robust Pseudorandom Number Generators | 04/2015 – 09/2015 |
K.S. | Approximation of the Maximum in Big Data | 11/2014 – 07/2015 |
V.F. | Sanitizable Signcryption: Sanitizing over Encrypted Data | 01/2015 – 06/2015 |
S.M. | Deniable Message Authentication. (See WPES 2015 publication) | 10/2014 – 04/2015 |
N.F. | Limitations of the Meta-Reduction Technique: The Case of Schnorr Signatures. (See Eurocrypt 2013 publication) | 05/2012 – 09/2012 |
A.M. | Hash Function Combiners Revisited. (See SCN 2012 publication) | 02/2011 – 08/2011 |
S.H. | Adaptive All-But-One Lossy Trapdoor Functions and Their Applications | 01/2011 – 06/2011 |
L.G., M.L. (joint) | CAPTCHAnalyzer: a Java-based framework for Scrutinizing CAPTCHAs (in German) | 05/2010 – 10/2010 |
P.B. | Non-Malleability of Hash Functions and Applications to Skein. (See CT-RSA 2011 publication) | 10/2009 – 03/2010 |
H.M. | Balancing IT-Security Management between Regulations, Standards and Best-Practice Approaches (in German). | 08/2007 – 01/2008 |
Supervised Bachelor Theses
P. H. | Performance Analysis of Multilinear Galois Mode and Variants | 06/2024 - |
M. H. | Source hiding of DVS and SDVS: comparing post-quantum constructions | 04/2024 - |
P. B. | Analysing a Protocol with Distributed Message Ownership and Central Verifying Entity: A Minecraft Case Study | 03/2024 - |
I.E. S. | Key Establishment Mechanisms in Bluetooth Mesh | 11/2023 – 05/2024 |
J.P. T. | Out-of-Band Authentication in Wireless Communication | 11/2023 – 06/2024 |
K. K. | Benchmarking PQC algorithms on SoloKeys | 09/2023 – 04/2024 |
L. P. | Security in E-Mail Communication | 09/2023 – 04/2024 |
D. C. | Asynchronous Remote Key Generation in FIDO2 | 07/2023 – 02/2024 |
V. H. | Rethinking Computational Complexity | 01/2023 – 07/2023 |
M. S. | Analysis of Bluetooth 5.3 Secure Connections Protocol using Verifpal | 10/2022 – 05/2023 |
S. B. | SoK: Near Field Communication – Use Cases and Their Security | 06/2022 – 12/2022 |
A.N. | Implementing practical deniability in Signal | 06/2022 – 12/2022 |
Y.H. | Investigation of variants of the Grover Algorithm | 06/2022 – 02/2023 |
T.G. | Efficiente blinde signature schemes | 04/2022 – 10/2022 |
S.B. | Schlüsseleinbettung in Zufallswerten bei TLS 1.3 | 04/2022 – 10/2022 |
D.D. | Comparing Security Definitions for Designated Verifies Signatures | 04/2022 – 09/2022 |
V.T. | Untersuchung von Black-Box Helpfulness | 08/2021 – 09/2022 |
V.Z. | SoK: Secure Group Messaging | 11/2021 – 05/2022 |
R.M. | Security Analysis of Group Chats in Matrix | 11/2021 – 05/2022 |
C.J.S. | Survey: Cryptographic Attacks on Bluetooth | 11/2021 – 05/2022 |
J.G. | Secure and Scalable Access Control of Cryptographic Objects | 11/2021 – 02/2022 |
D.W. | Analyse des Apple CSAM Detection Systems | 10/2021 – 03/2022 |
T.D. | Wie designiert man einen Verifizierer | 09/2021 – 03/2022 |
J.M.H. | Integration ELSA into CogniCrypt | 04/2021 – 09/2021 |
B.J.B. | Nostradamus Attack through Quantum Computer | 06/2021 – 09/2021 |
M.H. | On a Quantum Distinguisher for Three-Round-Feistel Ciphers with Internal Permutations | 04/2021 – 09/2021 |
S.A. | Integration eines Schlüsselaustauschprotokolls | 12/2020 – 05/2021 |
M.B. | Hybrides TLS 1.3 | 12/2020 – 07/2021 |
S.K. | Die Entwicklung der Kryptographie durch Einführen des Quantencomputers im Hinblick auf gitterbasierte und multivariate Verfahren | 12/2020 – 05/2021 |
K.H.Y. | Analyse von Zufallszahlengeneratoren | 12/2020 – 04/2021 |
R.K. | Analyse der Authentifizierungsmethode der VDV-Kernapplikation | 11/2020 – 02/2021 |
P.-F.L. | How Threshold Ring Signature Schemes hide the Signers | 11/2020 – 04/2021 |
N.S. | Random Oracles in Schlüsselaustauschverfahren | 11/2020 – 04/2021 |
J.M. | Performance Analysis of Message Franking Schemes | 11/2020 – 03/2021 |
F.B. | Security of the FIDO2 Standard | 05/2020 – 09/2020 |
T.K. | Security of the USB-Type-C Authentication Protocol (in German) | 05/2019 – 07/2019 |
J.-P.M. | Analysis of the Current State of Non Memory-Hard Password-Based Cryptographic Primitives | 04/2019 – 06/2019 |
A.M. | The Ratcheting Mechanism in the Wire Messenger (in German) | 11/2018 – 02/2019 |
LI. | Supporting users identifying phishing emails | 11/2018 – 02/2019 |
O.E. | Security of E-Mail Encryption | 04/2018 – 06/2018 |
K.S. | A Survey on Post-Quantum Key Exchange | 08/2017 – 10/2017 |
J.K. | Speed-Ups for the Search of NP Witnesses with Grovers Algorithm (in German) | 11/2012 – 01/2013 |
T.K. | Iterative CAPTCHA (Strengthening CAPTCHA Against Human Aided Attacks) | 10/2012 – 01/2013 |
P.N. | Implementing a Post-Processing Procedure for Quantum Cryptography (in German). Co-Advisor: Prof. Thomas Walther (Physics Department, TU Darmstadt) | 01/2012 – 04/2012 |
B.M. | On the Security of reCAPTCHA. (see SEC 2011 publication) | 04/2010 – 06/2010 |
O.E. | Comparing Indifferentiability Notions for Random Oracles. Co-Adviser: Anja Lehmann (TU Darmstadt) | 12/2009 – 03/2010 |
T.-M.N. | Distribution Analysis of Automatically Generated Lotto Data (in German) | 06/2008 – 08/2008 |
M.H. | Partially Blind Signatures (in German) | 05/2008 – 08/2008 |
R.L. | Security Concepts of CAPTCHAs (in German). (see Sicherheit 2010 publication) | 04/2008 – 07/2008 |
D.W. | Hash-Function Combiners in SSL/TLS. (see CT-RSA 2010 publication) | 04/2008 – 07/2008 |