Betreute Abschlussarbeiten

Betreute Master- und Diplom-Arbeiten

J. F. Robust Combinders for Blind Signatures 01/2024 -
S. W. Schlüsselableitungsfunktionen: Extraktionsschritt mit festen Salt-Werten 01/2024 -
J.M. H. Session Identifiers im UC-Model 12/2023 –
J. M. Analysis of PQ-EAC protocol using Tamarin 12/2023 -
M. H. Maschinelles Lernen in der Kryptoanalyse 01/2023 – 06/2023
T. K. Bitcoin Netzwerkopolo9gieerkennung durch Timing-Analyse 10/2022 – 03/2023
Y. M. Sicherheit der NIST SP800 108r1 Schlüsselableitungsfunktionen 11/2022 – 04/2023
C.-M. N. A. Overview of key establishment in Wi-Fi 07/2022 – 12/2022
E.E. K. Analyse von Angriffen auf Multivariate PKE und KEM im NIST Prozess 06/2022 – 12/2022
A. R. Untersuchung neuer Signaturverfahren auf Buff-Eigenschaften 06/2022 – 02/2023
J. R. Two Proofs for Black-Box Impossibility of Collision Resistance from One-Wayness 01/2022 – 09/2022
B.J. B. MitM-Attack on Ternary LWE-Keys with O(n)Qubits 05/2022 – 08/2022
S. C. Post-Quantum Asynchronous Remote Key Generation (wird in neuem Tab geöffnet) 01/2022 – 07/2022
L. I. Bessere Phishing-Erkennung mittels Tool-Support – Analyse Existierend prototypische Umsetzung eines Erweiterungskonzepts für TORPEDO 05/2021 – 12/2021
L. B.. Immunizing Hash-Based Signatures from Backdoored Hash Functions 04/2021 – 08/2021
S.R. M. Development of an integration and debugging process for a service-oriented architecture of automated vehicles 12/2020 – 06/2021
M. C. Shifting to a state-of-the-art password policy: A communication and training approach to increas employees' password security 10/2020 – 06/2021
N. N. From Perimeter Security to Zero Trust Networks using Service Meshes 03/2020 – 09/2020
C. B. Development and analysis of a secure and usable data backup system for privacy friendly apps 02/2020 – 08/2020
R. F. Advanced Security Notions for (Post-Quantum) Signature Schemes 11/2019 – 05/2020
O. K. Analysis of Bluetooth „Secure Simple Pairing“ with Tamarin 12/2019 – 11/2020
A. A. Authenticated Encryption for S3 Object Storage Systems 12/2018 – 05/2019
M. H. Cryptographic Analysis of the Bitmessage Protocol 06/2018 – 12/2018
R. K. Zero-Knowledge Contingent Payments 11/2017 – 05/2018
F. R. Complexity-theoretic Implications of Indistinguishability Obfuscation 04/2017 – 10/2017
A. E. A Construction for an Extremely Lossy Function based on the Learning With Errors Problem 04/2017 – 09/2017
S. J. Secure Computation in MapReduce 10/2016 – 04/2017
R. E. Analysis of the MTProto Protocol 10/2015 – 03/2016
T. W. Combiners for Robust Pseudorandom Number Generators 04/2015 – 09/2015
K. S. Approximation of the Maximum in Big Data 11/2014 – 07/2015
V. F. Sanitizable Signcryption: Sanitizing over Encrypted Data 01/2015 – 06/2015
S. M. Deniable Message Authentication. (Siehe Publikation WPES 2015) 10/2014 – 04/2015
N. F. Limitations of the Meta-Reduction Technique: The Case of Schnorr Signatures. (Siehe Publikation Eurocrypt 2013) 05/2012 – 09/2012
A. M. Hash Function Combiners Revisited. (Siehe Publikation SCN 2012) 02/2011 – 08/2011
S. H. Adaptive All-But-One Lossy Trapdoor Functions and Their Applications 01/2011 – 06/2011
L. G., M. L. (joint) CAPTCHAnalyzer: a Java-based framework for Scrutinizing CAPTCHAs (in German) 05/2010 – 10/2010
P. B. Non-Malleability of Hash Functions and Applications to Skein. (See CT-RSA 2011 publication) 10/2009 – 03/2010
H. M. Balancing IT-Security Management between Regulations, Standards and Best-Practice Approaches (in German). 08/2007 – 01/2008

Betreute Bachelorarbeiten

P. B. Analysing a Protocol with Distributed Message Ownership and Central Verifying Entity: A Minecraft Case Study 03/2024 -
I.E. S. Key Establishment Mechanisms in Bluetooth Mesh 11/2023 -
J.P. T. Out-of-Band Authentication in Wireless Communication 11/2023 -
K.K. Benchmarking PQC algorithms on SoloKeys 09/2023 -
L.P. Security in E-Mail Communication 09/2023 -
D.C. Asynchronous Remote Key Generation in FIDO2 07/2023 – 02/2024
V.H. Rethinking Computational Complexity 01/2023 – 07/2023
M.S. Analysis of Bluetooth 5.3 Secure Connections Protocol using Verifpal 10/2022 – 05/2023
Y.H. Untersuchung von Varianten des Grover-Algorithmus 06/2022 – 02/2023
A.N. Implementierung praktischer Abstreitbarkeit in Signal 06/2022 – 12/2022
S.B. Übersicht: Near-Field-Communication – Anwendungsfälle und Sicherheit 06/2022 – 10/2022
D.D. Comparing Security Definitions for Designated Verifier Signatures 04/2022 – 09/2022
T.G. Effiziente blinde Signaturverfahren 04/2022 – 10/2022
S.B. Schlüsseleinbettung in Zufallswerten bei TLS 1.3 04/2022 – 10/2022
V.T. Untersuchung von Black-Box Helpfulness 08/2021 – 09/2022
V.Z. SoK: Secure Group Messaging 11/2021 – 05/2022
R.M. Security Analysis of Group Chats in Matrix 11/2021 – 05/2022
C.J.S. Survey: Cryptographic Attacks on Bluetooth 11/2021 – 05/2022
J.G. Secure and Scalable Access Control of Cryptographic Objects 11/2021 – 02/2022
D.W. Analyse des Apple CSAM Detection Systems 10/2021 – 03/2022
T.D. Wie designiert man einen Verifizierer 09/2021 – 03/2022
J.M.H. Integration ELSA into CogniCrypt 04/2021 – 09/2021
B.J.B. Nostradamus Attack through Quantum Computer 06/2021 – 09/2021
M.H. On a Quantum Distinguisher for Three-Round Feistel Ciphers with Internal Permutations 04/2021 – 09/2021
S.A. Integration eines Schlüsselaustauschprotokolls 12/2020 – 05/2021
M.B. Hyrides TLS 1.3 12/2020 – 07/2021
S.K. Die Entwicklung der Kryptographie durch Einführen des Quantencomputers im Hinblick auf gitterbasierte und multivariate Verfahren 12/2020 – 05/2021
K.H.Y. Analyse von Zufallszahlengeneratoren 12/2020 – 04/2021
M.M. Suche auf verschlüsselten Daten im Thunderbird Client 11/2020 – 06/2021
R.K. Analyse der Authentifizierungsmethode der VDV-Kernapplikation 11/2020 – 02/2021
P.-F.L. How Threshold Ring Signature Schemes hide the Signers 11/2020 – 04/2021
N.S. Random Oracles in Schlüsselaustauschverfahren 11/2020 – 04/2021
J.M. Performance Analysis of Message Franking Schemes 11/2020 – 03/2021
F.B. Security of the FIDO2 Standard 05/2020 – 09/2020
T.K. Security of the USB-Type-C Authentication Protocol (in German) 05/2019 – 07/2019
J.-P.M. Analysis of the Current State of Non Memory-Hard Password-Based Cryptographic Primitives 04/2019 – 06/2019
A.M. The Ratcheting Mechanism in the Wire Messenger (in German) 11/2018 – 02/2019
L.I. Supporting users identifying phishing emails 11/2018 – 02/2019
O.E. Security of E-Mail Encryption 04/2018 – 06/2018
K.S. A Survey on Post-Quantum Key Exchange 08/2017 – 10/2017
J.K. Speed-Ups for the Search of NP Witnesses with Grovers Algorithm (in German) 11/2012 – 01/2013
T.K. Iterative CAPTCHA (Strengthening CAPTCHA Against Human Aided Attacks) 10/2012 – 01/2013
P.N. Implementing a Post-Processing Procedure for Quantum Cryptography (in German). Co-Advisor: Prof. Thomas Walther (Physics Department, TU Darmstadt) 01/2012 – 04/2012
B.M. On the Security of reCAPTCHA (siehe auch SEC 2011 Veröffentlichung) 04/2010 – 06/2010
O.E. Comparing Indifferentiability Notions for Random Oracles. Co-Adviser: Anja Lehmann (TU Darmstadt) 12/2009 – 03/2010
T.-M. N. Distribution Analysis of Automatically Generated Lotto Data (auf deutsch) 06/2008 – 08/2008
M.H. Partially Blind Signatures (auf deutsch) 05/2008 – 08/2008
R.L. Security Concepts of CAPTCHAs (auf deutsch) (siehe auch Sicherheit 2010 Veröffentlichung) 04/2008 – 07/2008
D.W. Hash-Function Combiners in SSL/TLS (siehe auch CT-RSA 2010 Veröffentlichung) 04/2008 – 07/2008