Tanja Lange's homepage
Home
News
Conferences
Editorships
Outreach and panels
Press
Projects
Publications
Students
PhD students
Master theses
Bachelor theses
Talks
Teaching
Links
Contact and GPG keys
Seite auf deutsch
PhD Students
Jacob Appelbaum
Gustavo Banegas
(PhD since November 2019; supervised together with
Daniel J. Bernstein
)
Thesis:
Selected constructive and destructive approaches to post-quantum cryptography
Peter Birkner
(PhD since February 2009; supervised together with
Daniel J. Bernstein
)
Thesis:
Efficient arithmetic on low-genus curves
Gaetan Bisson
(PhD since July 2011); supervised together with
Pierrick Gaudry
, Nancy)
Thesis:
Endomorphism rings in cryptography
Tung Chou
(PhD since June 2016; supervised together with
Daniel J. Bernstein
)
Thesis:
Accelerating pre- and post-quantum cryptography
Chitchanok Chuengsatiansup
(PhD since March 2017; supervised together with
Daniel J. Bernstein
)
Thesis:
Optimizing curve-based cryptography
Henry de Valence
(Sep 2015- Nov 2016)
Emmanouil Doulgerakis
Leon Groot Bruinderink
(supervision together with
Daniel J. Bernstein
and
Andreas Hülsing
)
Thijs Laarhoven
(PhD since February 2016; supervised together with
Benne de Weger
and
Boris Skoric
)
Thesis:
Search problems in cryptography: from fingerprinting to lattice sieving
Michael Naehrig
(PhD since May 2009)
Thesis:
Constructive and computational aspects of cryptographic pairings
Ruben Niederhagen
(PhD since April 2012)
Thesis:
Parallel cryptanalysis
Lorenz Panny
(supervision together with
Daniel J. Bernstein
)
Christiane Peters
(PhD since May 2011)
Thesis:
Curves, codes, and cryptography
Reza Rezaeian Farashahi
(PhD since October 2008)
Thesis:
Curves and Jacobians : number extractors and efficient arithmetic
Peter Schwabe
(PhD since January 2011)
Thesis:
High-speed cryptography and cryptanalysis
Christine van Vredendaal
(PhD since June 2018; supervised together with
Daniel J. Bernstein
)
Thesis
Exploiting mathematical structures in cryptography
Florian Weber
(supervision together with
Andreas Hülsing
)
Master Theses
Milou Antheunisse
Kleptography : cryptography with backdoors
(2015)
Niels Duif
Smart card implementation of a digital signature scheme for Twisted Edwards curves
(2011)
Lars Elmegaard-Fessel
Efficient Scalar Multiplication and Security against Power Analysis in Cryptosystems based on the NIST Elliptic Curves over Prime Fields
(2006)
Wouter de Groot
A performance study of X25519 on Cortex-M3 and M4
(2015)
Leon Groot Bruinderink
Towards post-quantum bitcoin : side-channel analysis of bimodal lattice signatures
(2016)
Maran van Heesch
Post-Quantum Key Exchange Based on ring-LWE
(2016)
Bor de Kock
A Non-Interactive Key Exchange based on Ring-Learning With Errors
(2018)
Eran Lambooij
Cryptanalysis of Simon et al. – Cryptanalysis of lightweight symmetric ciphers
(2017)
Kay Lukas
Algebraic differential attacks on symmetric cryptography
(2016)
Marc Makkes
Efficient implementation of homomorphic cryptosystems
(2010)
Kai-Chun Ning
An Adaption of the Crossbred Algorithm for Solving Multivariate Quadratic Systems over F2 on GPUs
(2017)
Cristina Onete
Visualisation of modern key exchange schemes for more than two parties in CrypTool and their security analysis
(2008)
Jeroen Pijnenburg
Lattice-Based Signatures – Rényi Divergence Analysis
(2017)
Yujia Qiu
On a link between towers of function fields and group theory
(2010)
Inigo Querejeta
A study of the General Number Field Sieve and a development of a CT2 plug-in using YAFU
(2016)
Coen Ramaekers
Fully homomorphic encryption in JCrypTool
(2009)
Dimitrij Ray
Constructing the Deuring Correspondence with Applications to Supersingular Isogeny-Based Cryptography
(2018)
Kit Smeets
Securing BLISS-b Against Side-Channel Attacks Lattice-Based Cryptography in a Post-Quantum Setting
(2017)
Sebastian Verschoor
Secure messaging in mobile environments
(2015)
Christine van Vredendaal
Rank estimation methods in side channel attacks
(2014)
Peter Wu
Analysis of the WireGuard protocol
(2019)
Bachelor Theses
Haico Dorenbos Efficiency of RNS in CSIDH (2019)
Stijn Gunter Timing Attacks and the NTRU Public-Key Cryptosystem (2019)
Iggy van Hoof
Analysis of efficiency of algorithms used in batch factorization
(2015)
Robin Kwant
Klepto for Post-Quantum Encryption
(2016)
Anne Smeets
Transformation from Weierstrass curves to Jacobi curves
(2014)
Kimberley Thissen
Klepto for Post-Quantum Signatures
(2016)
Bart de Wit
NTRU : a lattice-based encryption system
(2014)
Last modified: 2019.11.15