Completed Theses

Supervised Master and Diploma Theses

A.A. B. Cryptographic analysis of the messenger Olvid 04/2024
J. F. Robust Combiners for Blind Signatures 01/2024 – 07/2024
S. W. Key Derivation Functions: Extraction Step with Fixed Salt Values 01/2024 -
J.M. H. Session Identifiers in the UC-Model 12/2023 – 06/2024
J. M. Analysis of PQ-EAC protocol using Tamarin 12/2023 – 07/2024
T. D. Authenticated Key Exchange Security of Signal's PQXDH Protocol 10/2023 – 04/2024
K. K. Benchmarking PQC Algorithms on SoloKeys 09/2023 – 03/2024
M. H. On the Machine Learning-based Differential Cryptanalysis of Lightweight Block Ciphers 01/2023 – 06/2023
T. K. Bitcoin Netwerktopologieerkennung durch Timing-Analyse 11/2023 – 03/2023
Y.M. Security of the NIST SP800 108r1 Key Derivation Functions 11/2022 – 04/2023
C.-M. N.A. Overview of key establishmend in Wi-Fi 07/2022 – 12/2022
E.E. K. Analyse von Angriffen auf Multivariate PKE und KEM im Nist Prozess 06/2022 – 12/2022
A.R. Untersuchung neuer Signaturverfahren auf Buff-Eigenschaften 06/2022 – 02/2023
J.R. Two Proofs of Black-Box Impossibility of Collision Resistance from One-Wayness 01/2022 – 09/2022
B.J.B. MitM-Attack on Ternary LWE-Keys with O(n) Qubits 05/2022 – 08/2022
S.C. Post-Quantum Asynchronous Remote Key Generation 01/2022 – 07/2022
L.I. Bessere Phishing-Erkennung mittels Tool-Support – Analyse Existierend prototypische Umsetzung eines Erweiterungskonzepts für TORPEDO 05/2021 – 12/2021
L.B. Backdoored Hash Functions: Immunizing Hash-Based Signatures 04/2021 – 08/2021
S.R.M. Development of an integration and debugging process for a service-oriented architecture of automated vehicles 12/2020 – 06/2021
M.C. Shifting to a state-of-the-art password policy: A communication and training approach to increas employees' password security 10/2020 – 06/2021
N.N. From Perimeter Security to Zero Trust Networks using Service Meshes 03/2020 – 09/2020
C.B. Development and analysis of a secure and usable data backup system for privacy friendly apps 02/2020 – 08/2020
R.F. Advanced Security Notions for (Post-Quantum) Signature Schemes 11/2019 – 04/2020
O.K. Analysis of Bluetooth „Secure Simple Pairing“ with Tamarin 12/2019 – 11/2020
A.A. Authenticated Encryption for S3 Object Storage Systems 12/2018 – 05/2019
M.H. Cryptographic Analysis of the Bitmessage Protocol 06/2018 – 12/2018
R.K. Zero-Knowledge Contingent Payments 11/2017 – 05/2018
F.R. Complexity-theoretic Implications of Indistinguishability Obfuscation 04/2017 – 10/2017
A.E. A Construction for an Extremely Lossy Function based on the Learning With Errors Problem 04/2017 – 09/2017
S.J. Secure Computation in MapReduce 10/2016 – 04/2017
R.E. Analysis of the MTProto Protocol 10/2015 – 03/2016
T.W. Combiners for Robust Pseudorandom Number Generators 04/2015 – 09/2015
K.S. Approximation of the Maximum in Big Data 11/2014 – 07/2015
V.F. Sanitizable Signcryption: Sanitizing over Encrypted Data 01/2015 – 06/2015
S.M. Deniable Message Authentication. (See WPES 2015 publication) 10/2014 – 04/2015
N.F. Limitations of the Meta-Reduction Technique: The Case of Schnorr Signatures. (See Eurocrypt 2013 publication) 05/2012 – 09/2012
A.M. Hash Function Combiners Revisited. (See SCN 2012 publication) 02/2011 – 08/2011
S.H. Adaptive All-But-One Lossy Trapdoor Functions and Their Applications 01/2011 – 06/2011
L.G., M.L. (joint) CAPTCHAnalyzer: a Java-based framework for Scrutinizing CAPTCHAs (in German) 05/2010 – 10/2010
P.B. Non-Malleability of Hash Functions and Applications to Skein. (See CT-RSA 2011 publication) 10/2009 – 03/2010
H.M. Balancing IT-Security Management between Regulations, Standards and Best-Practice Approaches (in German). 08/2007 – 01/2008

Supervised Bachelor Theses

P. H. Performance Analysis of Multilinear Galois Mode and Variants 06/2024 -
M. H. Source hiding of DVS and SDVS: comparing post-quantum constructions 04/2024 -
P. B. Analysing a Protocol with Distributed Message Ownership and Central Verifying Entity: A Minecraft Case Study 03/2024 -
I.E. S. Key Establishment Mechanisms in Bluetooth Mesh 11/2023 – 05/2024
J.P. T. Out-of-Band Authentication in Wireless Communication 11/2023 – 06/2024
K. K. Benchmarking PQC algorithms on SoloKeys 09/2023 – 04/2024
L. P. Security in E-Mail Communication 09/2023 – 04/2024
D. C. Asynchronous Remote Key Generation in FIDO2 07/2023 – 02/2024
V. H. Rethinking Computational Complexity 01/2023 – 07/2023
M. S. Analysis of Bluetooth 5.3 Secure Connections Protocol using Verifpal 10/2022 – 05/2023
S. B. SoK: Near Field Communication – Use Cases and Their Security 06/2022 – 12/2022
A.N. Implementing practical deniability in Signal 06/2022 – 12/2022
Y.H. Investigation of variants of the Grover Algorithm 06/2022 – 02/2023
T.G. Efficiente blinde signature schemes 04/2022 – 10/2022
S.B. Schlüsseleinbettung in Zufallswerten bei TLS 1.3 04/2022 – 10/2022
D.D. Comparing Security Definitions for Designated Verifies Signatures 04/2022 – 09/2022
V.T. Untersuchung von Black-Box Helpfulness 08/2021 – 09/2022
V.Z. SoK: Secure Group Messaging 11/2021 – 05/2022
R.M. Security Analysis of Group Chats in Matrix 11/2021 – 05/2022
C.J.S. Survey: Cryptographic Attacks on Bluetooth 11/2021 – 05/2022
J.G. Secure and Scalable Access Control of Cryptographic Objects 11/2021 – 02/2022
D.W. Analyse des Apple CSAM Detection Systems 10/2021 – 03/2022
T.D. Wie designiert man einen Verifizierer 09/2021 – 03/2022
J.M.H. Integration ELSA into CogniCrypt 04/2021 – 09/2021
B.J.B. Nostradamus Attack through Quantum Computer 06/2021 – 09/2021
M.H. On a Quantum Distinguisher for Three-Round-Feistel Ciphers with Internal Permutations 04/2021 – 09/2021
S.A. Integration eines Schlüsselaustauschprotokolls 12/2020 – 05/2021
M.B. Hybrides TLS 1.3 12/2020 – 07/2021
S.K. Die Entwicklung der Kryptographie durch Einführen des Quantencomputers im Hinblick auf gitterbasierte und multivariate Verfahren 12/2020 – 05/2021
K.H.Y. Analyse von Zufallszahlengeneratoren 12/2020 – 04/2021
R.K. Analyse der Authentifizierungsmethode der VDV-Kernapplikation 11/2020 – 02/2021
P.-F.L. How Threshold Ring Signature Schemes hide the Signers 11/2020 – 04/2021
N.S. Random Oracles in Schlüsselaustauschverfahren 11/2020 – 04/2021
J.M. Performance Analysis of Message Franking Schemes 11/2020 – 03/2021
F.B. Security of the FIDO2 Standard 05/2020 – 09/2020
T.K. Security of the USB-Type-C Authentication Protocol (in German) 05/2019 – 07/2019
J.-P.M. Analysis of the Current State of Non Memory-Hard Password-Based Cryptographic Primitives 04/2019 – 06/2019
A.M. The Ratcheting Mechanism in the Wire Messenger (in German) 11/2018 – 02/2019
LI. Supporting users identifying phishing emails 11/2018 – 02/2019
O.E. Security of E-Mail Encryption 04/2018 – 06/2018
K.S. A Survey on Post-Quantum Key Exchange 08/2017 – 10/2017
J.K. Speed-Ups for the Search of NP Witnesses with Grovers Algorithm (in German) 11/2012 – 01/2013
T.K. Iterative CAPTCHA (Strengthening CAPTCHA Against Human Aided Attacks) 10/2012 – 01/2013
P.N. Implementing a Post-Processing Procedure for Quantum Cryptography (in German). Co-Advisor: Prof. Thomas Walther (Physics Department, TU Darmstadt) 01/2012 – 04/2012
B.M. On the Security of reCAPTCHA. (see SEC 2011 publication) 04/2010 – 06/2010
O.E. Comparing Indifferentiability Notions for Random Oracles. Co-Adviser: Anja Lehmann (TU Darmstadt) 12/2009 – 03/2010
T.-M.N. Distribution Analysis of Automatically Generated Lotto Data (in German) 06/2008 – 08/2008
M.H. Partially Blind Signatures (in German) 05/2008 – 08/2008
R.L. Security Concepts of CAPTCHAs (in German). (see Sicherheit 2010 publication) 04/2008 – 07/2008
D.W. Hash-Function Combiners in SSL/TLS. (see CT-RSA 2010 publication) 04/2008 – 07/2008