Prof. Dr.-Ing. Tibor Jager

Theses

We offer theses for many topics in the area of IT security and cryptography. The offered theses cover a wide area of topics ranging from application-related to theoretical or research-related. We are always looking for motivated students who are interested in writing a thesis in our group. Below you can find a description of some current research projects in our group. If any of the research projects piques your interest and you want to write a thesis related to the project please contact Tom Neuschulten (neuschulten[at]uni-wuppertal.de). Furthermore, you are always welcome to propose your own ideas for a thesis topic in the area of IT security and cryptography, that is not related to our current research projects.

Ongoing Theses

  • Comparing Post-Quantum Instantiations of the TLS 1.3 Handshake (BA, Jonas Dinspel)
  • The Post-Quantum Security of Password Protected Secret Sharing (MA, Marc Westenberger)
  • On Building Blocks Enabling Post-Quantum Secure Cryptographic Protocols (MA, Björn Lorenzen)

Finished Theses

2026

  • Distributed/Decentralized Identity-Based Encryption (Annika Zensen, BA)

2025

  • Kyber: Theoretical Foundations and An Implementation Vulnerability (Sebastian Dederer, BA)
  • Automated Implementations of Pairing-based ABE in Charm (Adrian Ackermann, MA)
  • Post-Quanten-Sicherheit für das Online-Certificate-Status-Protocol (Jan Horning, BA)
    Prämiert mit einem Barmenia-Förderpreis 2025.
  • Kryptanalyse einer altitalienischen Geheimschrift aus dem 15. Jahrhundert (Janis Gawrych, BA)
  • Systematizing Key Revocation Techniques in Attribute-Based Encryption (Ayush Garg, BA)
  • Print-and-Store Protocols for Secure Key Retrieval (Dennis Funke, MA)
  • Über die Sicherheit des GPV-Frameworks (Kevin Schumacher, BA)
  • Scharfe Sicherheitsschranken im Kontext Identitätsbasierter Verschlüsselung (Laura Droste, BA)
  • Secure Storage: Eine systematische Analyse moderner Speichertechnologien (Anton Nagel, BA)
  • Effects of Runtime Scheduling of Secure Multi-Party Computation Protocols on Secure Inference (Tim Lüdeke, MA)

2024

  • Analyzing the Secure Value Recovery Protocol in Signal (BA, Deborah Fa)
  • Evaluierung der Anwendungspotenziale von Secure Multiparty Computation im Gesundheitswesen (BA, Jonas Lützenkirchen)
    Prämiert mit einem Barmenia-Förderpreis 2024.
  • On the Integrity of Outsourced Storage (BA, Björn Lorenzen)
    Prämiert mit einem Barmenia-Förderpreis 2024.
  • Oblivious TLS: Application and Analysis (MA, Tom Neuschulten)
  • Analyzing FALCON: A Post-Quantum Signature Scheme (Kevin Schumacher, BA)
  • Kryptanalyse homophoner Substitutionschiffren (Sebastian Baum, BA)
  • Garbled Circuits for Embedded SMPC Applications (Phil Schmieder, MA)

2023

  • Der Raft Consensus Algorithmus: Eine sicherheitsorientierte Analyse (BA, Marc Westenberger)

2022

  • Sichere Implementierung Elliptischer Kurven in eingebetteten Systemen (MA, Timo Witte)
  • Erweiterung des CIC-IDS2017 Trainingsdatensatzes mit Bleichenbachers Angriff (BA, Hendrik Dappen)
  • On the Cryptanalysis of Historical Substitution Ciphers (BA, Adrian Ackermann)
  • Multi-User ORAM (BA, Felix Kauka)
  • Pushing the AutoSCA Tool to Picosecond Precision: Improving Timing Side Channel Detection (BA, Dennis Funke)

2021

  • Explanation of the Briar App (BA, Pascal Jeschke)
  • Length-Hiding Encryption: Implementation and Analysis (BA, Tom Neuschulten)
  • Isogeny-based Signatures (MA, Jonas von der Heyden)
  • Detection of Timing Side Channels - Extending the AutoSCA Tool (BA, Anastasija Berlinblau)

2020

  • Formalizing Security for Session Resumption Across Hostnames (MA, Tobias Handirk)
  • Instanziierung von Verifiable Random Functions mit Computational Admissible Hash Functions (BA, Robin Stunic)
  • Efficient Point Multiplication on Elliptic Curves (BA, Robin Jaroschek)