The following is a list of master theses that I have supervised since 2012 at Aarhus University (including exchange students and students who are not from the Computer Science Department).
Name | Year | Title |
---|---|---|
Magnus Nielsen | 2022 | Searchable Encryption Based on ORAM |
Benjamin Hansen | 2022 | Searchable Encryption Based on ORAM |
Morten Eskildsen | 2021 | Privacy in Contact Tracing Applications |
Sune Clausen | 2021 | Privacy in Contact Tracing Applications |
Søren Jacobsen | 2021 | Privacy in Contact Tracing Applications |
Bingsen Wang | 2021 | Threshold PS Signatures |
Jonathan Krogsager | 2021 | Achieving Privacy in Whistleblowing Systems with Employment Verification |
Jacob Olsen | 2021 | Achieving Privacy in Whistleblowing Systems with Employment Verification |
Alexander Munch-Hansen | 2020 | Security and Compactness of Threshold Ring Signatures and Related Primitives |
Mikkel Juhl | 2020 | Robust Decentralised Storage Networks from Proofs of Spacetime |
Henriette Rohde | 2020 | Robust Decentralised Storage Networks from Proofs of Spacetime |
Daniel Alexander Andreasen | 2019 | Towards Secure & Efficient Obfuscation |
Camilla Grevy | 2019 | Finding the Best Full-Threshold ECDSA Signature Scheme |
Ulrik Boll Djurtoft | 2019 | Finding the Best Full-Threshold ECDSA Signature Scheme |
Peter Askebjerg | 2018 | GC Based 2PC on Algebraically Committed Inputs | Martin Messel | 2018 | GC Based 2PC on Algebraically Committed Inputs | Kristian Dath | 2018 | Efficient Oblivious Transfer-based Protocols in MPC | Morten Christensen | 2018 | Post-Quantum Cryptography: Hash-based and ZK-based Signature Schemes |
Kasper Smed | 2018 | Anonymous credentials from bilinear pairings |
Christian Bobach | 2017 | Secure Distributed Poker using MPC |
Flemming Hald | 2017 | Distributed Access Control in Smart Metering Networks |
Anders Dalskov | 2017 | End-to-End Encrypted Cloud Storage |
Maiken Søgaard | 2017 | Functional and Homomorphic Signatures |
Maiken Søgaard | 2017 | Functional and Homomorphic Signatures |
Tue Holst | 2017 | Ring-LWE based Multi-Key FHE |
Mikkel Lambæk | 2016 | Breaking and Fixing Private Set Intersection Protocols |
Nafsika Antoniadou | 2016 | Reductions of Cryptographic Assumptions |
Jesper Madsen | 2016 | Zero-Knowledge for Boolean Circuits |
Anders Konring | 2015 | On the Anonymity of SPV in the Bitcoin Protocol |
Jakob Bjerre Jakobsen | 2015 | A Practical Cryptanalysis of the Telegram Messaging Protocol |
Torben Brandt Hansen | 2015 | Canonical and Systematic Approach to Cryptographic Subversion |
Helene Flyvholm Haagh | 2015 | Constructions of Functional Encryption |
Morten Djernæs Bech | 2015 | Oblivious Transfer Extension Protocols |
Jon Korsgaard Sorensen | 2014 | Security analysis of Bitcoin |
Luca Melis | 2013 | On the Learning Parity with Noise Problem |
Thomas Nørlem Rasmussen | 2014 | Fully homomorphic Encryption and multilinear Maps |
Rune Steen Laursen | 2014 | Cryptographic Applications of Software Obfuscation |
Bjarke Vældgaard Grøn | 2013 | How to Verify the Correctness of Delegated Computations |
Peter Høeg Steffensen | 2013 | How to Verify the Correctness of Delegated Computations |
Come by my office (Nygaard 282) or drop my an email (orlandi at cs.au.dk)
Last update: