Supervised Master and Diploma Theses
| L. P. | Timing-Attacks on Software- und Hardware Levels | 11/2025 - |
| T. H. | Investigation of Athenticated Encryption Modes based on AES-GCM and AES-GCM-SIV | 10/2025 - |
| G. B. K. | Extracting Randomness – Different Criterions for the Leftover Hash Lemma | 06/2025 - |
| S. M. W. | A Cryptographic Analysis of C2PA_s Content Credentials | 05/2025 - |
| M. K. | Quotient Filters in Adversarial Environments | 04/2025 – 11/2025 |
| L. T. | Implementation of the Authentication Schemes in Bluetooth | 01/2025 – 07/2025 |
| R. D. | Invisibility of Sanitizable Signatures | 11/2024 – 07/2025 |
| L. R. | About qInd-qCCA2 Secure Symmetric Encryption Schemes | 10/2024 – 05/2025 |
| C. S. | Describing a Secure Cloud Storage | 10/2024 – 04/2025 |
| J. F. | Robust Combiners for Blind Signatures | 01/2024 – 07/2024 |
| S. W. | Key Derivation Functions: Extraction Step with Fixed Salt Values | 01/2024 – 07/2024 |
| J.M. H. | Session Identifiers in the UC-Model | 12/2023 – 06/2024 |
| J. M. | Analysis of PQ-EAC protocol using Tamarin | 12/2023 – 07/2024 |
| T. D. | Authenticated Key Exchange Security of Signal's PQXDH Protocol | 10/2023 – 04/2024 |
| K. K. | Benchmarking PQC Algorithms on SoloKeys | 09/2023 – 03/2024 |
| M. H. | On the Machine Learning-based Differential Cryptanalysis of Lightweight Block Ciphers | 01/2023 – 06/2023 |
| T. K. | Bitcoin Netwerktopologieerkennung durch Timing-Analyse | 11/2023 – 03/2023 |
| Y.M. | Security of the NIST SP800 108r1 Key Derivation Functions | 11/2022 – 04/2023 |
| C.-M. N.A. | Overview of key establishmend in Wi-Fi | 07/2022 – 12/2022 |
| E.E. K. | Analyse von Angriffen auf Multivariate PKE und KEM im Nist Prozess | 06/2022 – 12/2022 |
| A.R. | Untersuchung neuer Signaturverfahren auf Buff-Eigenschaften | 06/2022 – 02/2023 |
| J.R. | Two Proofs of Black-Box Impossibility of Collision Resistance from One-Wayness | 01/2022 – 09/2022 |
| B.J.B. | MitM-Attack on Ternary LWE-Keys with O(n) Qubits | 05/2022 – 08/2022 |
| S.C. | Post-Quantum Asynchronous Remote Key Generation | 01/2022 – 07/2022 |
| L.I. | Bessere Phishing-Erkennung mittels Tool-Support – Analyse Existierend prototypische Umsetzung eines Erweiterungskonzepts für TORPEDO | 05/2021 – 12/2021 |
| L.B. | Backdoored Hash Functions: Immunizing Hash-Based Signatures | 04/2021 – 08/2021 |
| S.R.M. | Development of an integration and debugging process for a service-oriented architecture of automated vehicles | 12/2020 – 06/2021 |
| M.C. | Shifting to a state-of-the-art password policy: A communication and training approach to increas employees' password security | 10/2020 – 06/2021 |
| N.N. | From Perimeter Security to Zero Trust Networks using Service Meshes | 03/2020 – 09/2020 |
| C.B. | Development and analysis of a secure and usable data backup system for privacy friendly apps | 02/2020 – 08/2020 |
| R.F. | Advanced Security Notions for (Post-Quantum) Signature Schemes | 11/2019 – 04/2020 |
| O.K. | Analysis of Bluetooth „Secure Simple Pairing“ with Tamarin | 12/2019 – 11/2020 |
| A.A. | Authenticated Encryption for S3 Object Storage Systems | 12/2018 – 05/2019 |
| M.H. | Cryptographic Analysis of the Bitmessage Protocol | 06/2018 – 12/2018 |
| R.K. | Zero-Knowledge Contingent Payments | 11/2017 – 05/2018 |
| F.R. | Complexity-theoretic Implications of Indistinguishability Obfuscation | 04/2017 – 10/2017 |
| A.E. | A Construction for an Extremely Lossy Function based on the Learning With Errors Problem | 04/2017 – 09/2017 |
| S.J. | Secure Computation in MapReduce | 10/2016 – 04/2017 |
| R.E. | Analysis of the MTProto Protocol | 10/2015 – 03/2016 |
| T.W. | Combiners for Robust Pseudorandom Number Generators | 04/2015 – 09/2015 |
| K.S. | Approximation of the Maximum in Big Data | 11/2014 – 07/2015 |
| V.F. | Sanitizable Signcryption: Sanitizing over Encrypted Data | 01/2015 – 06/2015 |
| S.M. | Deniable Message Authentication. (See WPES 2015 publication) | 10/2014 – 04/2015 |
| N.F. | Limitations of the Meta-Reduction Technique: The Case of Schnorr Signatures. (See Eurocrypt 2013 publication) | 05/2012 – 09/2012 |
| A.M. | Hash Function Combiners Revisited. (See SCN 2012 publication) | 02/2011 – 08/2011 |
| S.H. | Adaptive All-But-One Lossy Trapdoor Functions and Their Applications | 01/2011 – 06/2011 |
| L.G., M.L. (joint) | CAPTCHAnalyzer: a Java-based framework for Scrutinizing CAPTCHAs (in German) | 05/2010 – 10/2010 |
| P.B. | Non-Malleability of Hash Functions and Applications to Skein. (See CT-RSA 2011 publication) | 10/2009 – 03/2010 |
| H.M. | Balancing IT-Security Management between Regulations, Standards and Best-Practice Approaches (in German). | 08/2007 – 01/2008 |
Supervised Bachelor Theses
| J. K. | Analysis of Isogeny-based OPRF constructions | 03/2025 – 09/2025 |
| D. S. | Analysis of Lightway VPN protocol | 01/2025 – 06/2025 |
| B. J. S. | Survey: Attacks on Key Exchange in WPA3 | 03/2025 – 06/2025 |
| A. T. | Performance Analysis of PQC Algorithms on Nitrokeys | 09/2024 – 03/2025 |
| P. H. | Performance Analysis of Multilinear Galois Mode and Variants | 06/2024 – 01/2025 |
| M. H. | Source hiding of DVS and SDVS: comparing post-quantum constructions | 04/2024 – 10/2024 |
| P. B. | Analysing a Protocol with Distributed Message Ownership and Central Verifying Entity: A Minecraft Case Study | 03/2024 – 09/2024 |
| I.E. S. | Key Establishment Mechanisms in Bluetooth Mesh | 11/2023 – 05/2024 |
| J.P. T. | Out-of-Band Authentication in Wireless Communication | 11/2023 – 06/2024 |
| K. K. | Benchmarking PQC algorithms on SoloKeys | 09/2023 – 04/2024 |
| L. P. | Security in E-Mail Communication | 09/2023 – 04/2024 |
| D. C. | Asynchronous Remote Key Generation in FIDO2 | 07/2023 – 02/2024 |
| V. H. | Rethinking Computational Complexity | 01/2023 – 07/2023 |
| M. S. | Analysis of Bluetooth 5.3 Secure Connections Protocol using Verifpal | 10/2022 – 05/2023 |
| S. B. | SoK: Near Field Communication – Use Cases and Their Security | 06/2022 – 12/2022 |
| A.N. | Implementing practical deniability in Signal | 06/2022 – 12/2022 |
| Y.H. | Investigation of variants of the Grover Algorithm | 06/2022 – 02/2023 |
| T.G. | Efficiente blinde signature schemes | 04/2022 – 10/2022 |
| S.B. | Schlüsseleinbettung in Zufallswerten bei TLS 1.3 | 04/2022 – 10/2022 |
| D.D. | Comparing Security Definitions for Designated Verifies Signatures | 04/2022 – 09/2022 |
| V.T. | Untersuchung von Black-Box Helpfulness | 08/2021 – 09/2022 |
| V.Z. | SoK: Secure Group Messaging | 11/2021 – 05/2022 |
| R.M. | Security Analysis of Group Chats in Matrix | 11/2021 – 05/2022 |
| C.J.S. | Survey: Cryptographic Attacks on Bluetooth | 11/2021 – 05/2022 |
| J.G. | Secure and Scalable Access Control of Cryptographic Objects | 11/2021 – 02/2022 |
| D.W. | Analyse des Apple CSAM Detection Systems | 10/2021 – 03/2022 |
| T.D. | Wie designiert man einen Verifizierer | 09/2021 – 03/2022 |
| J.M.H. | Integration ELSA into CogniCrypt | 04/2021 – 09/2021 |
| B.J.B. | Nostradamus Attack through Quantum Computer | 06/2021 – 09/2021 |
| M.H. | On a Quantum Distinguisher for Three-Round-Feistel Ciphers with Internal Permutations | 04/2021 – 09/2021 |
| S.A. | Integration eines Schlüsselaustauschprotokolls | 12/2020 – 05/2021 |
| M.B. | Hybrides TLS 1.3 | 12/2020 – 07/2021 |
| S.K. | Die Entwicklung der Kryptographie durch Einführen des Quantencomputers im Hinblick auf gitterbasierte und multivariate Verfahren | 12/2020 – 05/2021 |
| K.H.Y. | Analyse von Zufallszahlengeneratoren | 12/2020 – 04/2021 |
| R.K. | Analyse der Authentifizierungsmethode der VDV-Kernapplikation | 11/2020 – 02/2021 |
| P.-F.L. | How Threshold Ring Signature Schemes hide the Signers | 11/2020 – 04/2021 |
| N.S. | Random Oracles in Schlüsselaustauschverfahren | 11/2020 – 04/2021 |
| J.M. | Performance Analysis of Message Franking Schemes | 11/2020 – 03/2021 |
| F.B. | Security of the FIDO2 Standard | 05/2020 – 09/2020 |
| T.K. | Security of the USB-Type-C Authentication Protocol (in German) | 05/2019 – 07/2019 |
| J.-P.M. | Analysis of the Current State of Non Memory-Hard Password-Based Cryptographic Primitives | 04/2019 – 06/2019 |
| A.M. | The Ratcheting Mechanism in the Wire Messenger (in German) | 11/2018 – 02/2019 |
| LI. | Supporting users identifying phishing emails | 11/2018 – 02/2019 |
| O.E. | Security of E-Mail Encryption | 04/2018 – 06/2018 |
| K.S. | A Survey on Post-Quantum Key Exchange | 08/2017 – 10/2017 |
| J.K. | Speed-Ups for the Search of NP Witnesses with Grovers Algorithm (in German) | 11/2012 – 01/2013 |
| T.K. | Iterative CAPTCHA (Strengthening CAPTCHA Against Human Aided Attacks) | 10/2012 – 01/2013 |
| P.N. | Implementing a Post-Processing Procedure for Quantum Cryptography (in German). Co-Advisor: Prof. Thomas Walther (Physics Department, TU Darmstadt) | 01/2012 – 04/2012 |
| B.M. | On the Security of reCAPTCHA. (see SEC 2011 publication) | 04/2010 – 06/2010 |
| O.E. | Comparing Indifferentiability Notions for Random Oracles. Co-Adviser: Anja Lehmann (TU Darmstadt) | 12/2009 – 03/2010 |
| T.-M.N. | Distribution Analysis of Automatically Generated Lotto Data (in German) | 06/2008 – 08/2008 |
| M.H. | Partially Blind Signatures (in German) | 05/2008 – 08/2008 |
| R.L. | Security Concepts of CAPTCHAs (in German). (see Sicherheit 2010 publication) | 04/2008 – 07/2008 |
| D.W. | Hash-Function Combiners in SSL/TLS. (see CT-RSA 2010 publication) | 04/2008 – 07/2008 |