Bachelor's Theses

Available Projects

Students interested in a thesis with the group are kindly requested to send their transcript of records, along with a CV highlighting any relevant experience in cryptography, and either a preferred topic from the proposals below or a description of their interests within cryptography, to the contact noted under Student Projects.

Last updated: 17.09.2025

Ongoing Projects

(We recommend students currently doing a project in our group to use this Download LaTeX template for writing their thesis.)

Completed Projects

2025

Fabio Sutter. Efficient Hatching: Rethinking Cuckoo Insertion for Private Set Intersection. Supervisor: Prof. Kenny Paterson, Co-supervisors: Laura Hetz, Dr. Christian Weinert (Royal Holloway, University of London).

Marius Mayer. Design and Evaluation of Group Messaging for Wireless Mesh Networks in Humanitarian Missions. Supervisor: Prof. Kenny Paterson, Co-supervisor: Dr. Stefan Mangold.

Brian Funk. Analysis and Use of Delay-Tolerant Networking for Wireless Mesh Networks in Humanitarian Missions. Supervisor: Prof. Kenny Paterson, Co-supervisor: Dr. Stefan Mangold.

2024

Janet Greutmann. Systematizing and Benchmarking Mitigation Techniques for Attacks Against Range Schemes [Download pdf (PDF, 1.8 MB)]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Dr. Francesca Falzon.

2023

Lucas Schenck. (Secure?) Cloud Backup Solutions: A Survey [Download pdf (PDF, 1 MB)]. Supervisor: Prof. Kenny Paterson, Co-supervisors: Matteo Scarlata, Kien Tuong Truong.

Moussab Katouh. Evaluating the Performance of Subquadratic Multiplication Algorithms. Supervisor: Prof. Kenny Paterson, Co-supervisor: Jan Gilcher.

Melanie Jauch. Quantumania: Three Quantum Attacks on AES-OTR’s Confidentiality and a Quantum Key-Recovery Attack on OPP [Download pdf (PDF, 644 KB)]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Varun Maram.

2022

Siu-Sing Yip. Tight Automated Parameter Selection for Efficient FHE. Supervisor: Prof. Kenny Paterson, Co-supervisor: Alexander Viand.

Marc Himmelberger. Concrete IND-CCA Security of NIST PQC KEMs in the ROM [Download pdf (PDF, 1.3 MB)]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Varun Maram.

Oliver Dudler. Parallel Golden Collision Search on GPUs [pdf]Supervisor: Prof. Kenny Paterson, Co-supervisor: Dr. Fernando Virdia.

Philipp Engljähringer. Cascaded Bloom Filters in CRLite and their parameter selection [Download pdf (PDF, 2.3 MB)]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Mia Filić.

Björn Kaufmann. Evaluating Constant-Time Languages and Compilers [Download pdf (PDF, 1.4 MB)]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Jan Gilcher.

Kevin Solmssen. Querying Time-Series Data Privately [Download pdf (PDF, 2.7 MB)]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Lukas Burkhalter.

2021

Fabio Bertschi. Private ML as a Service for Natural Language Processing [Download pdf (PDF, 3 MB)]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Alexander Viand.

Mirco Stäuble. Data structures for puncturable encryption [Download pdf (PDF, 2.9 MB)]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Matilda Backendal.

Filip Dobrosavljevic. Prime Generation by Incremental Search: An Experimental Exploration [Download pdf (PDF, 11.3 MB)]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Mia Filić.

Oliver Tran. Exploring RSA Assumptions [Download pdf (PDF, 8.6 MB)]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Varun Maram.

Livia CapolExperimenting with the Bleichenbacher Attack [Download pdf (PDF, 3.5 MB)]. Supervisor: Prof. Kenny Paterson.

2020

Daniel Patrick Frey. Implementation of Maurer’s method for prime generation [Download pdf (PDF, 3.6 MB)]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Mia Filić.

Alemu Samuel Bedassa. The Transformation of TLS from Version 1.2 to 1.3: Efficiency vs Security vs Interoperability [pdf]. Supervisor: Prof. Kenny Paterson.

Karin Holzhauser. An Analysis of Bloom Filter Cascades - CRLite [Download pdf (PDF, 2.4 MB)]. Supervisor: Prof. Kenny Paterson.

 

JavaScript has been disabled in your browser