The following is a list of master theses that I have supervised since 2012 at Aarhus University (including exchange students and students who are not from the Computer Science Department).
| Name | Year | Title |
|---|---|---|
| Magnus Nielsen | 2022 | Searchable Encryption Based on ORAM |
| Benjamin Hansen | 2022 | Searchable Encryption Based on ORAM |
| Morten Eskildsen | 2021 | Privacy in Contact Tracing Applications |
| Sune Clausen | 2021 | Privacy in Contact Tracing Applications |
| Søren Jacobsen | 2021 | Privacy in Contact Tracing Applications |
| Bingsen Wang | 2021 | Threshold PS Signatures |
| Jonathan Krogsager | 2021 | Achieving Privacy in Whistleblowing Systems with Employment Verification |
| Jacob Olsen | 2021 | Achieving Privacy in Whistleblowing Systems with Employment Verification |
| Alexander Munch-Hansen | 2020 | Security and Compactness of Threshold Ring Signatures and Related Primitives |
| Mikkel Juhl | 2020 | Robust Decentralised Storage Networks from Proofs of Spacetime |
| Henriette Rohde | 2020 | Robust Decentralised Storage Networks from Proofs of Spacetime |
| Daniel Alexander Andreasen | 2019 | Towards Secure & Efficient Obfuscation |
| Camilla Grevy | 2019 | Finding the Best Full-Threshold ECDSA Signature Scheme |
| Ulrik Boll Djurtoft | 2019 | Finding the Best Full-Threshold ECDSA Signature Scheme |
| Peter Askebjerg | 2018 | GC Based 2PC on Algebraically Committed Inputs | Martin Messel | 2018 | GC Based 2PC on Algebraically Committed Inputs | Kristian Dath | 2018 | Efficient Oblivious Transfer-based Protocols in MPC | Morten Christensen | 2018 | Post-Quantum Cryptography: Hash-based and ZK-based Signature Schemes |
| Kasper Smed | 2018 | Anonymous credentials from bilinear pairings |
| Christian Bobach | 2017 | Secure Distributed Poker using MPC |
| Flemming Hald | 2017 | Distributed Access Control in Smart Metering Networks |
| Anders Dalskov | 2017 | End-to-End Encrypted Cloud Storage |
| Maiken Søgaard | 2017 | Functional and Homomorphic Signatures |
| Maiken Søgaard | 2017 | Functional and Homomorphic Signatures |
| Tue Holst | 2017 | Ring-LWE based Multi-Key FHE |
| Mikkel Lambæk | 2016 | Breaking and Fixing Private Set Intersection Protocols |
| Nafsika Antoniadou | 2016 | Reductions of Cryptographic Assumptions |
| Jesper Madsen | 2016 | Zero-Knowledge for Boolean Circuits |
| Anders Konring | 2015 | On the Anonymity of SPV in the Bitcoin Protocol |
| Jakob Bjerre Jakobsen | 2015 | A Practical Cryptanalysis of the Telegram Messaging Protocol |
| Torben Brandt Hansen | 2015 | Canonical and Systematic Approach to Cryptographic Subversion |
| Helene Flyvholm Haagh | 2015 | Constructions of Functional Encryption |
| Morten Djernæs Bech | 2015 | Oblivious Transfer Extension Protocols |
| Jon Korsgaard Sorensen | 2014 | Security analysis of Bitcoin |
| Luca Melis | 2013 | On the Learning Parity with Noise Problem |
| Thomas Nørlem Rasmussen | 2014 | Fully homomorphic Encryption and multilinear Maps |
| Rune Steen Laursen | 2014 | Cryptographic Applications of Software Obfuscation |
| Bjarke Vældgaard Grøn | 2013 | How to Verify the Correctness of Delegated Computations |
| Peter Høeg Steffensen | 2013 | How to Verify the Correctness of Delegated Computations |
Come by my office (Nygaard 282) or drop my an email (orlandi at cs.au.dk)
Last update: