Theses
We offer theses for many topics in the area of IT security and cryptography. The offered theses cover a wide area of topics ranging from application-related to theoretical or research-related. We are always looking for motivated students who are interested in writing a thesis in our group. Below you can find a description of some current research projects in our group. If any of the research projects piques your interest and you want to write a thesis related to the project please contact Tom Neuschulten (neuschulten[at]uni-wuppertal.de). Furthermore, you are always welcome to propose your own ideas for a thesis topic in the area of IT security and cryptography, that is not related to our current research projects.
Ongoing Theses
- Comparing Post-Quantum Instantiations of the TLS 1.3 Handshake (BA, Jonas Dinspel)
- The Post-Quantum Security of Password Protected Secret Sharing (MA, Marc Westenberger)
- On Building Blocks Enabling Post-Quantum Secure Cryptographic Protocols (MA, Björn Lorenzen)
Finished Theses
2026
- Distributed/Decentralized Identity-Based Encryption (Annika Zensen, BA)
2025
- Kyber: Theoretical Foundations and An Implementation Vulnerability (Sebastian Dederer, BA)
- Automated Implementations of Pairing-based ABE in Charm (Adrian Ackermann, MA)
- Post-Quanten-Sicherheit für das Online-Certificate-Status-Protocol (Jan Horning, BA)
Prämiert mit einem Barmenia-Förderpreis 2025. - Kryptanalyse einer altitalienischen Geheimschrift aus dem 15. Jahrhundert (Janis Gawrych, BA)
- Systematizing Key Revocation Techniques in Attribute-Based Encryption (Ayush Garg, BA)
- Print-and-Store Protocols for Secure Key Retrieval (Dennis Funke, MA)
- Über die Sicherheit des GPV-Frameworks (Kevin Schumacher, BA)
- Scharfe Sicherheitsschranken im Kontext Identitätsbasierter Verschlüsselung (Laura Droste, BA)
- Secure Storage: Eine systematische Analyse moderner Speichertechnologien (Anton Nagel, BA)
- Effects of Runtime Scheduling of Secure Multi-Party Computation Protocols on Secure Inference (Tim Lüdeke, MA)
2024
- Analyzing the Secure Value Recovery Protocol in Signal (BA, Deborah Fa)
- Evaluierung der Anwendungspotenziale von Secure Multiparty Computation im Gesundheitswesen (BA, Jonas Lützenkirchen)
Prämiert mit einem Barmenia-Förderpreis 2024. - On the Integrity of Outsourced Storage (BA, Björn Lorenzen)
Prämiert mit einem Barmenia-Förderpreis 2024. - Oblivious TLS: Application and Analysis (MA, Tom Neuschulten)
- Analyzing FALCON: A Post-Quantum Signature Scheme (Kevin Schumacher, BA)
- Kryptanalyse homophoner Substitutionschiffren (Sebastian Baum, BA)
- Garbled Circuits for Embedded SMPC Applications (Phil Schmieder, MA)
2023
- Der Raft Consensus Algorithmus: Eine sicherheitsorientierte Analyse (BA, Marc Westenberger)
2022
- Sichere Implementierung Elliptischer Kurven in eingebetteten Systemen (MA, Timo Witte)
- Erweiterung des CIC-IDS2017 Trainingsdatensatzes mit Bleichenbachers Angriff (BA, Hendrik Dappen)
- On the Cryptanalysis of Historical Substitution Ciphers (BA, Adrian Ackermann)
- Multi-User ORAM (BA, Felix Kauka)
- Pushing the AutoSCA Tool to Picosecond Precision: Improving Timing Side Channel Detection (BA, Dennis Funke)
2021
- Explanation of the Briar App (BA, Pascal Jeschke)
- Length-Hiding Encryption: Implementation and Analysis (BA, Tom Neuschulten)
- Isogeny-based Signatures (MA, Jonas von der Heyden)
- Detection of Timing Side Channels - Extending the AutoSCA Tool (BA, Anastasija Berlinblau)
2020
- Formalizing Security for Session Resumption Across Hostnames (MA, Tobias Handirk)
- Instanziierung von Verifiable Random Functions mit Computational Admissible Hash Functions (BA, Robin Stunic)
- Efficient Point Multiplication on Elliptic Curves (BA, Robin Jaroschek)