Go to content

Theses

Below is a list of open topics in our group. If you are interested in one of these, please contact directly the contact person indicated at the bottom. We don't have any other open topics at the moment. However, if you have an interesting idea for a master or bachelor thesis in the field of QPC, feel free to suggest this topic to us.


Open Theses

  • Title: Security Analysis of MAYO (Master thesis)
    Description: MAYO is a recently published signature scheme based on multivariate quadratic equations. Its performance and key sizes are compatible to lattice-based signature schemes, including NIST's finalists Dilithium and Falcon. An appealing task for such a young scheme is to investigate it regarding possible improvements in cryptanalysis. Like Rainbow and LUOV, MAYO is a modification of UOV. The past has shown that such modifications can lead to additional attack vectors, that might be exploited. Thus, a detailed security analysis is an important step in the development process of MAYO.
    Contact: Thomas Aulbach
  • Title: Analyzing attacks against code-based signatures (Master thesis)
    Description: Three signature schemes based on codes were submitted to the NIST PQC standardization process. During the first round, all of these submissions have been broken. The goal of this thesis is identify design mistakes made in the development of these signature schemes by analyzing the attacks and looking for similarities and differences.
    Contact: Juliane Kr?mer (jointly supervised with Patrick Struck)

  • Title: Studying several algorithms for optimizing code-based cryptography (Master thesis, in cooperation with the Thales Group)
    Description: Classic-McEliece is one of the oldest crypto schemes for asymmetric key exchange. From a security perspective, it is also one of the best algorithms, since there was no substantial decrease in its security level (as compared to other schemes, e.g., from lattice-based or multivariate cryptography). Besides these advantages, there are three disadvantages that are often reasons for avoiding the algorithm in practical use cases: 1) the public key size, 2) the time for computing the public key and 3) the need to store a big matrix on a processor until the computation of the public key is done. The main bottleneck for the last two disadvantages is the Gauss-Jordan algorithm for matrix inversion, which is mostly done in a na?ve manner. In this work, the main goal is to investigate the use of other algorithms as an alternative to the na?ve Gauss-Jordan, like Wiedemann’s algorithm, Strassen’s Algorithm or the Four Russian’s algorithm (or a combination). The algorithms should be investigated in regard for a sequential inversion (no need to hold the full matrix in a processor) with a low hardware footprint and in regard for parallelization with a larger hardware footprint but also for faster computation. After the investigation, the algorithm (or a combination of the mentioned algorithms) should be implemented on an FPGA.
    Contact: Juliane Kr?mer


Ongoing Theses

  • Laura Bismark
    Master
    PQC for automotive security
  • Paul-Philipp Schwarck
    Bachelor
    Security of classic McEliece PKE in Comparison with Niederreiter's PKE
    joint with Prof. Künnemann


Finished Theses

  • Tim Schumacher
    Master,
    Post-Quantum Authentication for Quantum Key Distribution,
    Joint with Maximilian Tippman, Universit?t Darmstadt
  • Leon Weingarten,
    Master,
    Isogeny-Based Cryptography: From SIDH’s Fall to New Horizons,
    joint with Prof. Dr. Müller

  • Andreas Hellenbrand,
    Master,
    Performance Evaluation of CSIDH on the Surface,
    joint with Prof. Dr. Reith

  • Michael Schaller,
    Master,
    Codes from Fibered Surfaces,
    joint with Prof. Dr. Bruinier

  • Erik Kubaczka,
    Master,
    Analysis of Attacks on Multivariate PKE and KEM in the NIST Process

  • Yulia Kuzovkova,
    Master,
    Side-Channel Analysis of Post-Quantum Secure Lattice-Based Cryptographic Schemes

  • Yonca Bakanay,
    Master,
    Security proofs in the quantum random oracle model

  • Georg Wurst,
    Bachelor,
    Number Theoretic Codes and their application in cryptography (in German),
    joint with Prof. Dr. Bruinier

  • Azar Parishan,
    Bachelor,
    On the Security Notions for Encryption Schemes

  • Sebastian Schuberth,
    Master,
    Fault Attacks on Multivariate Signature Schemes


  1. Faculty of Informatics and Data Science

Chair of Data Security and Cryptography

Gruppenbild November 2024

Data Security and Cryptography

Quantum and Physical Attack Resistant Cryptography

Bajuwarenstra?e 4
93053 Regensburg