english only
School of Computer and Communication Sciences
LASEC - Security and Cryptography Laboratory
EPFL > IC > LASEC > Projects
Banner IC
INDEX
Home
People
Research
Teaching
Publications
Softwares & Events
Intranet
How to reach us

CONTACT

EPFL - I&C - ISC - LASEC
Station 14 - Building INF
CH-1015 Lausanne
Switzerland

Tel. +41 21 693 7603
Fax. +41 21 693 7689

Completed Projects


Diploma Projects

Summer semester 2022

  • Access control
  • Application of artificial intelligence in side-channel security
  • Document representation for end-to-end encrypted search and machine learning
  • NFC / side-channel attacks
  • Privacy-preserving technologies for decentralized personal data processing
  • Visually comparing hashes
  • Winter semester 2022

  • Post-Quantum Alternatives to X3DH
  • Summer semester 2021

  • Belief propagation on leakage from x86 microprocessors
  • Biometric Hashing Techniques for Fingervein Recognition
  • Crypto-Service
  • Developing privacy-enhancing application compatible with the Nym network
  • Side-Channel Resistance of NIST Lightweight Cryptography Candidates
  • Theoretical exploration of running costs, security and limitations of a fingervein recognition system
  • Summer semester 2020

  • Application of Verifiable Computation to Smart Contracts
  • Winter semester 2020

  • Improving cyber security posture through cryptographic agility
  • Smart Contracts Interacting with Private Data
  • Summer semester 2019

  • Persistent Fault Attacks
  • Winter semester 2019

  • Post Quantum Cryptography
  • Summer semester 2017

  • Design and implementation of a post-quantum cryptographic signature scheme
  • Position based cryptography
  • Summer semester 2016

  • Format preserving encryption for ELCrypt.
  • Winter semester 2016

  • Automatized Generic Solving
  • Security-Appliance Maker
  • Summer semester 2015

  • Secure Data Processing for Industrial Applications
  • Winter semester 2015

  • A System for Numerical Multi Party Computation
  • Authentication and Delegation for Inclusion in e-Government Services
  • Timing/Cache/Instruction attack on ECC point multiplication
  • Winter semester 2014

  • Covert Channels in IP Traffic
  • On the security of dev/random
  • Summer semester 2013

  • OOTCS Product Security
  • The LPN Problem and Algebraic Methods
  • Summer semester 2012

  • Case study on lattice-based cryptography
  • Summer semester 2011

  • Cryptanalysis of SHA-3 candidates
  • Winter semester 2010

  • Anonymous access control with attribute based encryption
  • Cloud Storage Integrity
  • Winter semester 2009

  • Analysis and implementation of the security in VoIP solutions
  • Vulnerabilities of the GSM stream cipher protocol
  • Winter semester 2008

  • Attacks on RSA with pre-formating rules
  • Conception and development of a web server audit tool
  • Public Key Infrastructure in a DVB-CPCM Environment
  • Secure Bluetooth Payment Application
  • Summer semester 2007

  • Efficient Protocols for Set Membership and Range Proofs
  • Strong Privacy in RFID needs public-key cryptography
  • Winter semester 2007

  • Fail-stop signatures
  • Summer semester 2006

  • Applications of MOVA signatures
  • Carrying out financial Transactions over cellular network
  • Security and Privacy in RFID
  • Trapdoor stream cipher
  • Summer semester 2005

  • Application avancée de compromis temps-mémoire
  • Secure Communications over Insecure Channels Based on Short Authenticated Strings
  • Winter semester 2005

  • E-Voting System
  • La sécurité dans les réseaux de capteurs sans fil
  • Network-Based Anomaly detection
  • Secure Identification Technologies
  • Summer semester 2004

  • AUTODAFE: an Act of Software Torture
  • Bluetooth Security
  • Formal verification of security protocols
  • Winter semester 2004

  • Analysis and optimizations of a key distillation protocol in quantum cryptography
  • Analysis of game based proofs for encryption schemes in the random oracle model
  • GPRS over billing attacks
  • On the security of ZIP files
  • VoIP Security
  • Web applications security - Automation of vulnerabilities assessment
  • Summer semester 2003

  • A Generalization Of Linear Cryptanalysis
  • GPRS Overbilling Attacks Detection
  • Integrating medium-oriented and network-oriented DRM technologies
  • PKI Deployment Considerations
  • Winter semester 2003

  • Strength and weaknesses analysis of security industrial standard TCPA and Finread
  • Winter semester 2001

  • EasyRide: Risk analysis and security concepts
  • Summer semester 2000

  • Linear cryptanalysis of DES

  • Doctoral School Projects

    Summer semester 2022

  • Biometric ID: Fuzzy Extractor
  • Post-Quantum Threshold Signature
  • Winter semester 2022

  • On non-transferable Anonymous Tokens and nonce-misuse resistant signatures
  • Summer semester 2020

  • Alternative primitives to HIBE for instantiating key updatable encryption
  • Comprehensive Energy Analysis of Trivium-like Ciphers
  • Hybrid cryptography in post-quantum security.
  • Witness Key Encapsulation Mechanism
  • Winter semester 2020

  • Witness Key Encapsulation Mechanism
  • Winter semester 2019

  • A Study of the Fujisaki-Okamoto Transform
  • Deniability for Ratcheted Key Agreement
  • Energy Investigation of NIST Lightweight Candidates
  • Security of McEliece Cryptosystems over QC-MDPC Codes
  • Winter semester 2018

  • The Resistance of Post-Quantum Cryptography to Algebraic Attacks
  • Summer semester 2017

  • Privacy-Preserving Secure Attestation
  • Time-lock encryption
  • Summer semester 2016

  • Automatized search for low complexity-strategies of exhaustive search
  • Winter semester 2016

  • Security of PACE (Password Authenticated Connection Establishment)
  • Applying the SFT Algorithm for Cryptography
  • Summer semester 2015

  • PrivDB Revisited
  • Winter semester 2015

  • Cryptanalysis of the Hill cipher
  • Supersingular Isogenies, an Algorithmic Study
  • Summer semester 2014

  • Misuse resistant AE
  • Winter semester 2014

  • Distance Bounding Protocols
  • Summer semester 2013

  • Optimizations of LPN Solving Algorithms
  • Winter semester 2013

  • Symmetric homomorphic encryption
  • Winter semester 2012

  • LPN Solving Algorithms
  • Winter semester 2009

  • On the complexity of distinguishing distributions
  • Summer semester 2002

  • Cryptanalysis of A5/1
  • Discrete logarithm algorithm in elliptic curves of trace one
  • Fair exchange for terminodes
  • Summer semester 2000

  • Implementation and Comparison of Several Public Key Cryptosystems

  • Semester Projects

    Summer semester 2022

  • Biometric ID: Migrating to NFC
  • Comprehensive Secure Messaging Benchmark
  • Constructions of 0-RTT with Forward Secrecy
  • Efficiency of Post-Quantum Protocols
  • Energy Efficient Cryptography
  • Leakage-resilient ratcheting
  • Post-quantum Zero-Knowledge Proofs
  • Quantum Cryptography
  • Winter semester 2022

  • A survey on evaluation cost of prime order isogenies
  • Decentralized group messaging
  • Exploring Pre-Computation in MPC
  • Fingervein biometric hashing
  • Fuzzy Extraction for Finger Veins
  • Impossibility results for TDFs and PKEs
  • Leakage-resilient cryptography and ratcheting
  • Optimized implementation of a biometric hash function
  • Post Quantum Polynomial Commitment Schemes
  • Privacy Economics
  • Short authenticated string (SAS) based cryptography
  • Solving the Shortest Vector Problem
  • The Lattice Isomorphism Problem (LIP) in Cryptography
  • The SCARE-Frontier
  • Summer semester 2020

  • Privacy-Protecting Biometric Identification
  • CCA Attacks with Decryption Errors
  • Constructing cryptographic primitives using elliptic curve isogenies and bilinear pairings
  • Cryptanalysis of Trivium
  • Determining the core primitive for continuous group key agreement
  • Efficient alternatives to MLS for group messaging
  • Hardware Implementation of NIST lightweight candidates
  • Improve Lattice-Based Attacks on Digital Signature Schemes
  • Lightweight AES 128/192/256
  • Optimal formulas for evaluating small degree isogenies
  • Persistent Fault Analysis on T-Table Implementations
  • Post-Quantum Cryptography Efficiency (bis)
  • Revisiting Microarchitectural Side-Channels
  • S-box Reverse engineering: on the decomposition of CMEA S-box
  • See in the Middle (SITM) attacks
  • Whitebox Cryptography
  • Winter semester 2020

  • Post-Quantum Cryptography Efficiency
  • Winter semester 2019

  • Biometric Access Control
  • Messaging Application with Ratcheting Security
  • Quantum-Resistant Asymmetrically Time-Hard Function
  • Summer semester 2018

  • Deterministic Paillier cryptosystem
  • Message-Franking in real life.
  • Time-lock puzzle and memory-hard function
  • Summer semester 2017

  • CUDA Crypto-Library
  • Fuzzy Extractors
  • Insights into sequentialized independent key-guessing attacks
  • Investigating (Im)possibility of Simultaneous Algorithm Subversion and Key Exfiltration Resistance
  • Winter semester 2017

  • Implementation of SPA
  • Implementation of the SFT algorithm
  • Summer semester 2016

  • Anonymous Secret Sharing Schemes
  • Cryptanalysis of the Hill cipher
  • Implementation of LWE algorithms
  • Implementing the pOMD
  • Online Ciphers: Security Notions, Constructions and Applications
  • Powerless Computation applied to Brute Force
  • Privacy Preserving Group Ranking
  • Relational hash in biometry
  • Survey of electronic payment systems
  • Winter semester 2016

  • Automated homework submission/grading system
  • Implementation of Authenticated encryption schemes on GPU
  • User Misuse-Resistance of Authenticated Encryption
  • Summer semester 2015

  • Fast implementation of OMD mode
  • Cryptographic analysis of Bluetooth 4.0
  • Extending the HELEN cryptosystem
  • LPN implementation on GPU
  • Modulo-based proof of work
  • NFC Relay Attacks using Android Devices
  • Security foundations in lattice-based cryptography
  • Winter semester 2015

  • Analysis/Implementation of Homomorphic Encryption Scheme
  • Biometric ID (Part 1)
  • Cryptanalysis of LowMC
  • Implementation of OMD mode on MIPS architecture
  • Implementing a Fair File Sharing System
  • Locally Computable Non-malleable Extractors
  • Masked Implementation of the OMD mode
  • Optimizations of LWE Solving Algorithms
  • Revisiting Hierarchical Deterministic Wallets (BIP-0032)
  • Study LWE algorithms
  • Summer semester 2014

  • A new SSL Library
  • Algebraic analysis implementation
  • Building system of equations for lightweight cipher
  • Comparison of the techniques used in Multidimensional Linear attacks
  • DES Sbox generation
  • Dropbox Wrapper
  • Relay attack in NFC
  • Software distance-bounding
  • Tamper Resilient Cryptography
  • Using proof-of-work for public key storage
  • Winter semester 2014

  • Attacking Bitcoin
  • OpenCL implementation of cryptographic algorithms
  • Post quantum cryptography in practice: a survey
  • Summer semester 2013

  • 2Factor Real Privacy Management cryptanalysis
  • Homomorphic Encryption
  • Quiz generator for Cryptography and Security course
  • Tamper-proof devices
  • Traffic visualization of Scion
  • Winter semester 2013

  • Authenticated Encryption Schemes: Design Principles and Security Notions
  • Integrated Certificate Verification
  • Leakage Resilient FHE
  • Really Provable Secure Multi-Factor Authentication
  • Winter semester 2012

  • Communication Surveillance on Android
  • Encrypted calendar
  • The Subspace Leanring With Error Problem
  • Summer semester 2011

  • Design of HELEN
  • Fingerprint recognition
  • Private backup
  • Short, Undeniable Signatures for Android 2.x
  • Winter semester 2011

  • Cryptanalysis of the Simple Substitution Cipher
  • Design of a code-based cryptosystem
  • Iteration Techniques for Compression Hash Functions
  • Quantum-based authentication protocol
  • Summer semester 2010

  • Selling train tickets by SMS
  • TCHo implementation in hardware
  • Total complexity of generic algorithms
  • Winter semester 2010

  • Grobner Basis Algorithms Evaluation
  • On Hiding Message Length in Symmetric-key Cryptography
  • Primeless Cryptography
  • Quasi-groups in symmetric cryptography
  • Summer semester 2009

  • Mistrusting Sellers and Malicious Buyers
  • When Passwords are Sufficient for Exchanging Keys among Humans
  • Winter semester 2009

  • Analysis of lightweight functions (Armadillo)
  • Approximation of carry bits in XAR hash functions
  • Cryptanalysis of MIBS Block Cipher
  • KeeLoq
  • Rethinking the PKI Trust Model
  • The Learning Parity With Noise Problem in Cryptography
  • Summer semester 2008

  • Incremental Hash Functions for Message Authentication
  • Manual key transfer
  • Winter semester 2008

  • Attack on IPSEC in non-authenticated mode
  • Diffie-Hellman vs Discrete Logarithm
  • RFID
  • Winter semester 2004

  • Non Adjacent Digit Sets for use in cryptographic primitives
  • Detailed descriptions

    © 2020, EPFL