Bachelor's Theses
Available Projects
Students interested in a thesis with the group are kindly requested to send their transcript of records, along with a CV highlighting any relevant experience in cryptography, and either a preferred topic from the proposals below or a description of their interests within cryptography, to the contact noted under Student Projects.
Last updated: 10.04.2025
Ongoing Projects
(We recommend students currently doing a project in our group to use this Download LaTeX template for writing their thesis.)
(Supervisor: Prof. Kenny Paterson, Joint Supervisor: Dr. Stefan Mangold)
Operational restrictions and limitations imposed by infrastructure and involved parties can pose challenges to reliable communication on humanitarian missions. This bachelor thesis aims to establish the foundations for a decentralized, peer-to-peer (P2P) mesh networking application, designed to improve communication reliability in such constrained environments. The application builds upon an analysis of existing solutions, such as Berty and Briar, to identify effective techniques and respective bottlenecks. By integrating these insights, the main functionalities of the application are developed. After having the core functionalities in place, this project focuses on the development and optimisation of Delay-Tolerant Networking (DTN) algorithms. This allows for asynchronous, store-and-forward messaging. The feasibility and effectiveness of proposed solutions are then assessed with a controlled testbed.
(Supervisor: Prof. Kenny Paterson, Joint Supervisor: Dr. Stefan Mangold)
This Bachelor's project propels the enhancement of a mesh networking prototype app, by incorporating group, broadcast, and unicast communication. Based on previously determined technical requirements, the project endeavors to analyze, design, and potentially modify elements of existing open-source messengers. The app leverages a decentralized, peer-to-peer (P2P) protocol. The addition of group and broadcast communication elevates the data transfer complexity, requiring improved routing mechanisms to address new scenarios. The solution aims for robustness, ensuring stable functionality despite interference and the presence of competing networks. Within this project, existing solutions are identified, analyzed, and documented. Performance metrics are established to facilitate the design and development of the enhanced application for both iOS and Android platforms. Furthermore, the project explores the possibilities and constraints of cross-platform communication. Communication performance is thoroughly analyzed and optimized wherever feasible, utilizing the available testbed with multiple devices. By addressing these complexities, the project aims to deliver a robust and reliable communication solution that meets the needs of users in various environments.
(Supervisor: Prof. Kenny Paterson, Joint Supervisors: Laura Hetz, Dr. Christian Weinert (Royal Holloway))
Cuckoo hash tables and probabilistic data structures like Cuckoo filters are crucial in cryptographic protocols addressing the private set intersection (PSI) problem, yet standard insertion methods can lead to inefficient restructuring or failure, especially amplifying communication costs to gigabyte levels in PSI contexts. This thesis aims to create new insertion strategies for these data structures to reduce communication costs while maintaining algorithmic efficiency. The strategies focus on minimizing the initial size of the hash table or filter, reducing relocations when adding items, and lowering failure or rehashing probabilities. These strategies will be theoretically analyzed and empirically tested to assess their performance, including runtime and memory overhead.
Completed Projects
2024
Janet Greutmann. Systematizing and Benchmarking Mitigation Techniques for Attacks Against Range Schemes [Download pdf (PDF, 1.8 MB)]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Dr. Francesca Falzon.
2023
Lucas Schenck. (Secure?) Cloud Backup Solutions: A Survey [Download pdf (PDF, 1 MB)]. Supervisor: Prof. Kenny Paterson, Co-supervisors: Matteo Scarlata, Kien Tuong Truong.
Moussab Katouh. Evaluating the Performance of Subquadratic Multiplication Algorithms. Supervisor: Prof. Kenny Paterson, Co-supervisor: Jan Gilcher.
Melanie Jauch. Quantumania: Three Quantum Attacks on AES-OTR’s Confidentiality and a Quantum Key-Recovery Attack on OPP [Download pdf (PDF, 644 KB)]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Varun Maram.
2022
Siu-Sing Yip. Tight Automated Parameter Selection for Efficient FHE. Supervisor: Prof. Kenny Paterson, Co-supervisor: Alexander Viand.
Marc Himmelberger. Concrete IND-CCA Security of NIST PQC KEMs in the ROM [Download pdf (PDF, 1.3 MB)]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Varun Maram.
Oliver Dudler. Parallel Golden Collision Search on GPUs [Download pdf]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Dr. Fernando Virdia.
Philipp Engljähringer. Cascaded Bloom Filters in CRLite and their parameter selection [Download pdf (PDF, 2.3 MB)]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Mia Filić.
Björn Kaufmann. Evaluating Constant-Time Languages and Compilers [Download pdf (PDF, 1.4 MB)]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Jan Gilcher.
Kevin Solmssen. Querying Time-Series Data Privately [Download pdf (PDF, 2.7 MB)]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Lukas Burkhalter.
2021
Fabio Bertschi. Private ML as a Service for Natural Language Processing [Download pdf (PDF, 3 MB)]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Alexander Viand.
Mirco Stäuble. Data structures for puncturable encryption [Download pdf (PDF, 2.9 MB)]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Matilda Backendal.
Filip Dobrosavljevic. Prime Generation by Incremental Search: An Experimental Exploration [Download pdf (PDF, 11.3 MB)]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Mia Filić.
Oliver Tran. Exploring RSA Assumptions [Download pdf (PDF, 8.6 MB)]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Varun Maram.
Livia Capol. Experimenting with the Bleichenbacher Attack [Download pdf (PDF, 3.5 MB)]. Supervisor: Prof. Kenny Paterson.
2020
Daniel Patrick Frey. Implementation of Maurer’s method for prime generation [Download pdf (PDF, 3.6 MB)]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Mia Filić.
Alemu Samuel Bedassa. The Transformation of TLS from Version 1.2 to 1.3: Efficiency vs Security vs Interoperability [Download pdf]. Supervisor: Prof. Kenny Paterson.
Karin Holzhauser. An Analysis of Bloom Filter Cascades - CRLite [Download pdf (PDF, 2.4 MB)]. Supervisor: Prof. Kenny Paterson.