Bachelor's Theses

Available Projects

Students interested in a thesis with the group are kindly requested to send their transcript of records, along with a CV highlighting any relevant experience in cryptography, and either a preferred topic from the proposals below or a description of their interests within cryptography, to the contact noted under Student Projects.

Last updated: 10.04.2025

Ongoing Projects

(We recommend students currently doing a project in our group to use this Download LaTeX template for writing their thesis.)

(Supervisor: Prof. Kenny Paterson, Joint Supervisors: Laura Hetz, Dr. Christian Weinert (Royal Holloway))

Cuckoo hash tables and probabilistic data structures like Cuckoo filters are crucial in cryptographic protocols addressing the private set intersection (PSI) problem, yet standard insertion methods can lead to inefficient restructuring or failure, especially amplifying communication costs to gigabyte levels in PSI contexts. This thesis aims to create new insertion strategies for these data structures to reduce communication costs while maintaining algorithmic efficiency. The strategies focus on minimizing the initial size of the hash table or filter, reducing relocations when adding items, and lowering failure or rehashing probabilities. These strategies will be theoretically analyzed and empirically tested to assess their performance, including runtime and memory overhead.

Completed Projects

2025

Marius Mayer. Design and Evaluation of Group Messaging for Wireless Mesh Networks in Humanitarian Missions. Supervisor: Prof. Kenny Paterson, Co-supervisor: Dr. Stefan Mangold.

Brian Funk. Analysis and Use of Delay-Tolerant Networking for Wireless Mesh Networks in Humanitarian Missions. Supervisor: Prof. Kenny Paterson, Co-supervisor: Dr. Stefan Mangold.

2024

Janet Greutmann. Systematizing and Benchmarking Mitigation Techniques for Attacks Against Range Schemes [Download pdf (PDF, 1.8 MB)]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Dr. Francesca Falzon.

2023

Lucas Schenck. (Secure?) Cloud Backup Solutions: A Survey [Download pdf (PDF, 1 MB)]. Supervisor: Prof. Kenny Paterson, Co-supervisors: Matteo Scarlata, Kien Tuong Truong.

Moussab Katouh. Evaluating the Performance of Subquadratic Multiplication Algorithms. Supervisor: Prof. Kenny Paterson, Co-supervisor: Jan Gilcher.

Melanie Jauch. Quantumania: Three Quantum Attacks on AES-OTR’s Confidentiality and a Quantum Key-Recovery Attack on OPP [Download pdf (PDF, 644 KB)]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Varun Maram.

2022

Siu-Sing Yip. Tight Automated Parameter Selection for Efficient FHE. Supervisor: Prof. Kenny Paterson, Co-supervisor: Alexander Viand.

Marc Himmelberger. Concrete IND-CCA Security of NIST PQC KEMs in the ROM [Download pdf (PDF, 1.3 MB)]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Varun Maram.

Oliver Dudler. Parallel Golden Collision Search on GPUs [pdf]Supervisor: Prof. Kenny Paterson, Co-supervisor: Dr. Fernando Virdia.

Philipp Engljähringer. Cascaded Bloom Filters in CRLite and their parameter selection [Download pdf (PDF, 2.3 MB)]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Mia Filić.

Björn Kaufmann. Evaluating Constant-Time Languages and Compilers [Download pdf (PDF, 1.4 MB)]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Jan Gilcher.

Kevin Solmssen. Querying Time-Series Data Privately [Download pdf (PDF, 2.7 MB)]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Lukas Burkhalter.

2021

Fabio Bertschi. Private ML as a Service for Natural Language Processing [Download pdf (PDF, 3 MB)]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Alexander Viand.

Mirco Stäuble. Data structures for puncturable encryption [Download pdf (PDF, 2.9 MB)]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Matilda Backendal.

Filip Dobrosavljevic. Prime Generation by Incremental Search: An Experimental Exploration [Download pdf (PDF, 11.3 MB)]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Mia Filić.

Oliver Tran. Exploring RSA Assumptions [Download pdf (PDF, 8.6 MB)]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Varun Maram.

Livia CapolExperimenting with the Bleichenbacher Attack [Download pdf (PDF, 3.5 MB)]. Supervisor: Prof. Kenny Paterson.

2020

Daniel Patrick Frey. Implementation of Maurer’s method for prime generation [Download pdf (PDF, 3.6 MB)]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Mia Filić.

Alemu Samuel Bedassa. The Transformation of TLS from Version 1.2 to 1.3: Efficiency vs Security vs Interoperability [pdf]. Supervisor: Prof. Kenny Paterson.

Karin Holzhauser. An Analysis of Bloom Filter Cascades - CRLite [Download pdf (PDF, 2.4 MB)]. Supervisor: Prof. Kenny Paterson.

 

JavaScript has been disabled in your browser