Betreute Abschlussarbeiten

Betreute Master- und Diplom-Arbeiten

Y.M. Sicherheit der NIST SP800 108r1 Schlüsselableitungsfunktionen 11/2022 –
C.-M. N.A. Overview of key establishment in Wi-Fi 07/2022 -
T.L. Post-Quantum Extended Access Control Protocol 06/2022 -
A.R. Untersuchung neuer Signaturverfahren auf Buff-Eigenschaften 06/2022 -
J.R. Two Proofs for Black-Box Impossibility of Collision Resistance from One-Wayness 01/2022 – 09/2022
B.J.B. MitM-Attack on Ternary LWE-Keys with O(n)Qubits 05/2022 – 08/2022
S.C. Post-Quantum Asynchronous Remote Key Generation (wird in neuem Tab geöffnet) 01/2022 – 07/2022
L.I. Bessere Phishing-Erkennung mittels Tool-Support – Analyse Existierend prototypische Umsetzung eines Erweiterungskonzepts für TORPEDO 05/2021 – 12/2021
L.B. Immunizing Hash-Based Signatures from Backdoored Hash Functions 04/2021 – 08/2021
S.R.M. Development of an integration and debugging process for a service-oriented architecture of automated vehicles 12/2020 – 06/2021
M.C. Shifting to a state-of-the-art password policy: A communication and training approach to increas employees' password security 10/2020 – 06/2021
N.N. From Perimeter Security to Zero Trust Networks using Service Meshes 03/2020 – 09/2020
C.B. Development and analysis of a secure and usable data backup system for privacy friendly apps 02/2020 – 08/2020
R.F. Advanced Security Notions for (Post-Quantum) Signature Schemes 11/2019 – 05/2020
O.K. Analysis of Bluetooth „Secure Simple Pairing“ with Tamarin 12/2019 – 11/2020
A.A. Authenticated Encryption for S3 Object Storage Systems 12/2018 – 05/2019
M.H. Cryptographic Analysis of the Bitmessage Protocol 06/2018 – 12/2018
R.K. Zero-Knowledge Contingent Payments. 11/2017 – 05/2018
F.R. Complexity-theoretic Implications of Indistinguishability Obfuscation 04/2017 – 10/2017
A.E. A Construction for an Extremely Lossy Function based on the Learning With Errors Problem. 04/2017 – 09/2017
S.J. Secure Computation in MapReduce 10/2016 – 04/2017
R.E. Analysis of the MTProto Protocol 10/2015 – 03/2016
T.W. Combiners for Robust Pseudorandom Number Generators 04/2015 – 09/2015
K.S. Approximation of the Maximum in Big Data 11/2014 – 07/2015
V.F. Sanitizable Signcryption: Sanitizing over Encrypted Data 01/2015 – 06/2015
S.M. Deniable Message Authentication. (Siehe Publikation WPES 2015) 10/2014 – 04/2015
N.F. Limitations of the Meta-Reduction Technique: The Case of Schnorr Signatures. (Siehe Publikation Eurocrypt 2013) 05/2012 – 09/2012
A.M. Hash Function Combiners Revisited. (Siehe Publikation SCN 2012) 02/2011 – 08/2011
S.H. Adaptive All-But-One Lossy Trapdoor Functions and Their Applications 01/2011 – 06/2011
L.G., M.L. (gemeinsam) CAPTCHAnalyzer: a Java-based framework for Scrutinizing CAPTCHAs (in German) 05/2010 – 10/2010
P.B. Non-Malleability of Hash Functions and Applications to Skein. (See CT-RSA 2011 publication) 10/2009 – 03/2010
H.M. Balancing IT-Security Management between Regulations, Standards and Best-Practice Approaches (in German). 08/2007 – 01/2008

Betreute Bachelorarbeiten

S.B. Übersicht: Near-Field-Communication – Anwendungsfälle und Sicherheit 06/2022 – 10/2022
Y.H. Untersuchung von Varianten des Grover-Algorithmus 06/2022 -
A.N. Implementierung praktischer Abstreitbarkeit in Signal 06/2022 -
D.D. Comparing Security Definitions for Designated Verifier Signatures 04/2022 – 09/2022
T.G. Effiziente blinde Signaturverfahren 04/2022 – 10/2022
S.B. Schlüsseleinbettung in Zufallswerten bei TLS 1.3 04/2022 – 10/2022
V.T. Untersuchung von Black-Box Helpfulness 08/2021 – 09/2022
V.Z. SoK: Secure Group Messaging 11/2021 – 05/2022
R.M. Security Analysis of Group Chats in Matrix 11/2021 – 05/2022
C.J.S. Survey: Cryptographic Attacks on Bluetooth 11/2021 – 05/2022
J.G. Secure and Scalable Access Control of Cryptographic Objects 11/2021 – 02/2022
D.W. Analyse des Apple CSAM Detection Systems 10/2021 – 03/2022
T.D. Wie designiert man einen Verifizierer 09/2021 – 03/2022
J.M.H. Integration ELSA into CogniCrypt 04/2021 – 09/2021
B.J.B. Nostradamus Attack through Quantum Computer 06/2021 – 09/2021
M.H. On a Quantum Distinguisher for Three-Round Feistel Ciphers with Internal Permutations 04/2021 – 09/2021
S.A. Integration eines Schlüsselaustauschprotokolls 12/2020 – 05/2021
M.B. Hyrides TLS 1.3 12/2020 – 07/2021
S.K. Die Entwicklung der Kryptographie durch Einführen des Quantencomputers im Hinblick auf gitterbasierte und multivariate Verfahren 12/2020 – 05/2021
K.H.Y. Analyse von Zufallszahlengeneratoren 12/2020 – 04/2021
M.M. Suche auf verschlüsselten Daten im Thunderbird Client 11/2020 – 06/2021
R.K. Analyse der Authentifizierungsmethode der VDV-Kernapplikation 11/2020 – 02/2021
P.-F.L. How Threshold Ring Signature Schemes hide the Signers 11/2020 – 04/2021
N.S. Random Oracles in Schlüsselaustauschverfahren 11/2020 – 04/2021
J.M. Performance Analysis of Message Franking Schemes 11/2020 – 03/2021
F.B. Security of the FIDO2 Standard 05/2020 – 09/2020
T.K. Security of the USB-Type-C Authentication Protocol (in German) 05/2019 – 07/2019
J.-P.M. Analysis of the Current State of Non Memory-Hard Password-Based Cryptographic Primitives 04/2019 – 06/2019
A.M. The Ratcheting Mechanism in the Wire Messenger (in German) 11/2018 – 02/2019
L.I. Supporting users identifying phishing emails 11/2018 – 02/2019
O.E. Security of E-Mail Encryption 04/2018 – 06/2018
K.S. A Survey on Post-Quantum Key Exchange 08/2017 – 10/2017
J.K. Speed-Ups for the Search of NP Witnesses with Grovers Algorithm (in German) 11/2012 – 01/2013
T.K. Iterative CAPTCHA (Strengthening CAPTCHA Against Human Aided Attacks) 10/2012 – 01/2013
P.N. Implementing a Post-Processing Procedure for Quantum Cryptography (in German). Co-Advisor: Prof. Thomas Walther (Physics Department, TU Darmstadt) 01/2012 – 04/2012
B.M. On the Security of reCAPTCHA (siehe auch SEC 2011 Veröffentlichung) 04/2010 – 06/2010
O.E. Comparing Indifferentiability Notions for Random Oracles. Co-Adviser: Anja Lehmann (TU Darmstadt) 12/2009 – 03/2010
T.-M. N. Distribution Analysis of Automatically Generated Lotto Data (auf deutsch) 06/2008 – 08/2008
M.H. Partially Blind Signatures (auf deutsch) 05/2008 – 08/2008
R.L. Security Concepts of CAPTCHAs (auf deutsch) (siehe auch Sicherheit 2010 Veröffentlichung) 04/2008 – 07/2008
D.W. Hash-Function Combiners in SSL/TLS (siehe auch CT-RSA 2010 Veröffentlichung) 04/2008 – 07/2008