Master Theses | |||
Degree date | Author | Title | |
2024 | Bettina Wohlfender | On the consistency of regularity properties of the real numbers | |
2024 | Vivien Caroline Bammert | Security of algebraic geometry codes in code-based cryptography | |
2023 | Tatjana Bossalini | The ROCA vulnerability: a study on Coppersmith's algorithm and its applications | |
2023 | Yves Krähenbühl | Overview of classes of MDP convolutional codes and their erasure decoding algorithms | |
2023 | Diana Rauseo | Constructing cryptographic accumulators from key exchange protocols | |
2023 | Danai Hansmann | Bounds on the asymptotic rate of block codes | |
2022 | Josua Rutishauser | Unbalanced Oil & Vinegar and Rainbow Signature Scheme | |
2022 | Sascha Hoppler | Nexuses of Uniforms: A Family of Uniform Hypergraphs Representing IdealAccess Structures | |
2022 | Martin Bergamin | Matroids and their q-analogues | |
2022 | Kilian Fabian Werder | Construction of Rank Metric Convolutional Codes for Random Linear Network Coding | |
2021 | Niko Van Wyk | Analysis of a Code-Based Public Key Cryptosysytem having Quasi-Cyclic Structure | |
2021 | Sebastian Heri | Classification and construction of self-duale convolutional code | |
2021 | Andreia Venzin | Castelnuovo-Mumford Regularity and the Complexity of Gröbner Basis Algorithms | |
2021 | Katja Warth | Nicht-Standard Modelle der Peano Arithmetik | |
2020 | Sabrina Sewer | Post-Quantum Cryptosystem FrodoPKE Based on the Learning with Errors Problem | |
2020 | Marc Newman | A Study of Mathematical and Practical Aspects of Isogeny-based Diffie-Hellman | |
2020 | Noemi Zürcher | On the Intractability of Maximum- Likelihood Decoding for Reed–Solomon Self-Dual Codes | |
2020 | Niklas Gassner | Weight induced distance functions on Z/P5Z codes | |
2020 | Anina Gruica | MDP Convolutional Codes over Zpr | |
2020 | Jessica Bariffi | A Finite Geometry Construction for MDPC-Codes | |
2020 | Martina Meier | Spannbäume in dualen Graphen | |
2019 | Raffael Schüürmann | Gröbner Basis Algorithms and Applications in Multivariate Cryptography | |
2019 | Davide Walder | Overview of Cube Attacks with Analysis of the Stream Cipher Trivium | |
2019 | Katharina Merz | Poncelet Polygon Sitting in a Special Projective Pencil Are Affinely Regular | |
2018 | Andreas Bolfing | Cryptographic Primitives in Blockchain Technology | |
2018 | Nicole Rohrer | Generalization of Algorithms for Decoding Random Linear Codes | |
2018 | Gideon Villiger | A Variation of Steiner's Porism in Finite Miquelian Möbius Planes of Odd Order | |
2018 | Pascal Christinat | Pseudorandom Number Generator from the Finite Field Isomorphism Problem | |
2018 | Alessandro Verzasconi | An Investigation on Roos Bias in RC4 Key Scheduling Algorithm | |
2017 | Nicole Gubser | Applications of Chinese Remainder Codes in Cryptography | |
2017 | Violetta Weger | A Code-Based Cryptosystem using GRS codes | |
2017 | Chiara Agnese Salvini | Algorithmic methods to efficiently solve quadratic equations | |
2016 | Amos Cattaneo | An Overview of the Discrete Logarithm Problem over Finite Fields | |
2016 | Sophie Leuenberger | Error-correcting pairs for the McEliece cryptosystem | |
2016 | Christoph Gasche | Minimal unimodular Matrix Decomposition | |
2015 | Dominique Negele | About Simple Equations in Endomorphism Semirings of a Finite Chain | |
2015 | Martin Holzer | Finite Chain Rings, Finitely Generated Modules over Finite Chain Rings and Projective Hjelmslev Geometries | |
2015 | Michael Hartmann | The Ajtai-Dwork Cryptosystem and Other Cryptosystems Based on Lattices | |
2015 | Leila Mizrahi | Thoroughly Formalizing an Uncommom Construction of the Real Numbers | |
2015 | Benjamin Häni | Geschlossene Zyklen von konjugierten Kegelschnitten in der endlichen projektiven Koordinatenebene der Ordnung 3 | |
2015 | Edoardo Dotti | Eisenstein Polynomials over Holomorphy Rings | |
2015 | Christoph Irniger | General position of lines in projective spaces of low dimensions over a finite field | |
2015 | Marko Seric | Computational Considerations in Network Coding on Plücker Embedded Subspace Codes | |
2015 | Isabelle Raemy | Superregular Hankel Matrices Over Finite Fields: An Upper Bound of the Matrix Size and a Construction Algorithm | |
2015 | Judith Keller | Big Intersections in Projective Space | |
2014 | Mustafa Aylidere | Fully Homomorphic Encryption | |
2014 | Milan Markovic | Faktorization of Natural Numbers Based on Quaternion Algebra Using Lipschitz Integers | |
2013 | Helen Riedtmann | The Approximate Common Divisor Problem: Two Algorithmic Solutions | |
2013 | Kevin Brand | NTRU: A lattice-based Cryptosystem and Attacks against it | |
2013 | Regula Krapf | A complete proof of incompleteness | |
2013 | Rahel Spiess | An overview of Edwards curves over finite fields | |
2013 | Amaro Barreal Fernandez | Space-Time Code Constructions for Multiple-Input Multiple-Output Communication Systems | |
2012 | Andrea De Giorgi | McEliece Cryptosystems | |
2011 | Ian Hersberger | Coppersmith's Algorithm | |
2011 | Karin Sommer | Gate Complexity of Boolean Functions | |
2009 | Manuel Ribic | Matusumoto-Imai Tame-Transformation-Method Cryptosystem | |
2009 | Vita Pasic | Distribution of the number of rational points on elliptic curves over finite fields | |
2009 | Sandra Steiner | A multivariate appraoch to list decoding CRT codes | |
2009 | Dominic Looser | Some cryptological applications of bit rotations | |
2008 | Urs Wagner | Detection and Exploitation of Small Correlations in Stream Ciphers | |
2007 | Andres Rüdiger Gentzen | Understanding The XTR-System | |
2007 | Michele Casartelli | Semirings, Factoring and Tropical Algebra | |
2007 | Marion Wimmer | List decoding of Chinese remainder theorem codes | |
2007 | Richard Köppel | Efficient Tate Pairing Computation on Elliptic or Hyperelliptic Curves | |
2006 | Helen Stassen | The Semigroup Action Problem for Right Multiplication Groups of Finite Simple Non-Moufang Bol Loops | |
2006 | Ariel Amir | LDPC Codes over non-binary Alphabets |