Accueil > Research > Students : Bachelor - Master - PhD
Students : Bachelor - Master - PhD
mardi 1er septembre 2009, par Cayrel
Here is the list of the students I have supervised with their reports.
Current PhD students
- Mohamed Fall UCAD - Sénégal 04/23 → ...
Code-based cryptosystems - Nicolas Vallet UJM 01/23 → ...
Attaques par canaux auxiliaires des candidats du NIST - Viet-Sang Nguyen UJM 01/23 → ...
La protection des chiffrements symétriques contre les attaques physiques
Former PhD students
- Boly Seck UCAD - Sénégal 06/20 → 09/23
Etude et analyse de cryptosystèmes basés sur les codes correcteurs d’erreurs, report.
Ingénieur chez Alstom Lyon - Roumaissa Mahdjoubi USTHB - Algérie 06/15 → 03/22
Rank metric codes, report. - Lina Mortajine CIFRE Wisekey - France 03/18 → 10/21
Analyse d’algorithmes post-quantiques implantables en pratique, report.
Ingénieure chez ITK Engineering - Tania Richmond UJM 10/12 → 10/16
Implantation sécurisée de protocoles cryptographiques basés sur les codes, report.
Maîtresse de conférences à Nouméa - Nouvelle-Calédonie - Ousmane Ndiaye UCAD - Sénégal 10/12 → 08/16
Protocoles Post-Quantiques et Attaques Critiques, report.
Maître de conférences UCAD - Sénégal - Mohammed Meziani TUD - Germany 09/09 → 06/13
Designing and Improving Code-based Cryptosystems, report.
Senior Consultant Orange Cyberdefense - Allemagne - Mohamed El Yousfi TUD - Germany 09/09 → 06/13
Code-based Identification and Signature Schemes, report. - Robert Niebuhr TUD - Germany 09/09 → 06/12
Attacking and Defending Code-based Cryptosystems, report and webpage.
Director Inhouse Consulting, Head of GGP at Merck Group - Allemagne
PhD committee
Master students
- Kalen Couzon Univ. Versailles 04/21 → 09/21
Side-channel attacks on the NIST finalists - Sékou Diakité AIMS Sénégal 01/16 → 05/16
Les schémas de signatures et leurs constructions génériques, report. - Brice Odilon Boidje AIMS Sénégal 01/15 → 05/15
McBits : fast constant-time code-based cryptography, report. - Vlad Dragoi ISFA Univ. Lyon 1 04/13 → 10/13
Attaques par canaux cachés du schéma de McEliece, report. - Nicolas Nardeau and Wafa Benmoussa Cryptis Univ. Limoges 09/06 → 03/07
Forme canonique des matrices generatrices des codes quasi-cycliques, report. - Bertrand Zanzotto Cryptis Univ. Limoges 09/05 → 03/06
Implementation of the Stern Authentication Scheme, report.
Bachelor students
- Edward Poon University Ottawa 05/17 → 07/17
Constant weight encoding function, webpage. - Philippe Niles University Ottawa 05/16 → 07/16
Constant weight encoding function, webpage. - Amund Desmarais and Rayan Safieddine University Ottawa 05/14 → 07/14
Software implementation of Goppa decoders, report and webpage. - Quentin Santos L3 ENS Lyon 06/12 → 07/12
Software implementation of code-based hash functions and stream-ciphers, webpage. - Niklas Buscher and Jan Hendrick TUD - Germany 03/11 → 08/11
Implementation of the Hybrid McEliece Encryption Scheme HyMES, webpage. - Lucas Rothamel and Manuel Weiel TUD - Germany 03/11 → 08/11
Implementation of the RFSB hash function, webpage. - Marius Hansen and Daniel Quanz TUD - Germany 03/11 → 08/11
Code challenge website, webpage. - Julian Oleg Arenz and Sarah Magin TUD - Germany 03/11 → 08/11
Implementation of signature schemes with additional properties, webpage. - Felix Guenther and Holger Rother TUD - Germany 09/10 → 03/11
Implementation of code-based zero-knowledge identification schemes, webpage. - Matthias Boll and Thorsten Peter TUD - Germany 09/10 → 03/11
Implementation of code-based hash-functions and stream-ciphers, webpage. - David Meier and Daniel Demmler TUD - Germany 04/10 → 09/10
Implementation of the Kabatianskii, Krouk Smeet signature scheme, report. - Eric Arnoult L3 ENSTA 05/10 → 07/10
Implementation of a q-ary version of the Niederreiter cryptosystem, report. - Gerhard Hoffman TUD - Germany 12/09 → 04/11
Implementation of McEliece using quasi-dyadic Goppa codes, report.