Pierre-Louis Cayrel

Maître de conférences UJM - LabHC

Accueil > Research > Students : Bachelor - Master - PhD

Students : Bachelor - Master - PhD

mardi 1er septembre 2009, par Cayrel

Here is the list of the students I have supervised with their reports.

Current PhD students

  1. Mohamed Fall UCAD - Sénégal 04/23 → ...
    Code-based cryptosystems
  2. Nicolas Vallet UJM 01/23 → ...
    Attaques par canaux auxiliaires des candidats du NIST
  3. Viet-Sang Nguyen UJM 01/23 → ...
    La protection des chiffrements symétriques contre les attaques physiques

Former PhD students

  1. Boly Seck UCAD - Sénégal 06/20 → 09/23
    Étude et analyse de cryptosystèmes basés sur les codes correcteurs d’erreurs, report.
    Ingénieur chez Alstom Lyon
  2. Roumaissa Mahdjoubi USTHB - Algérie 06/15 → 03/22
    Rank metric codes, report.
  3. Lina Mortajine CIFRE Wisekey - France 03/18 → 10/21
    Analyse d’algorithmes post-quantiques implantables en pratique, report.
    Ingénieure chez ITK Engineering
  4. Tania Richmond UJM 10/12 → 10/16
    Implantation sécurisée de protocoles cryptographiques basés sur les codes, report.
    Maîtresse de conférences à Nouméa - Nouvelle-Calédonie
  5. Ousmane Ndiaye UCAD - Sénégal 10/12 → 08/16
    Protocoles Post-Quantiques et Attaques Critiques, report.
    Maître de conférences UCAD - Sénégal
  6. Mohammed Meziani TUD - Germany 09/09 → 06/13
    Designing and Improving Code-based Cryptosystems, report.
    Senior Consultant Orange Cyberdefense - Allemagne
  7. Mohamed El Yousfi TUD - Germany 09/09 → 06/13
    Code-based Identification and Signature Schemes, report.
  8. Robert Niebuhr TUD - Germany 09/09 → 06/12
    Attacking and Defending Code-based Cryptosystems, report and webpage.
    Director Inhouse Consulting, Head of GGP at Merck Group - Allemagne

Ph.D. committee

  1. Boly Seck UJM - UCAD 09/23
  2. Roumaissa Mahdjoubi USTHB - Algérie 03/22
  3. Lina Mortajine CIFRE Wisekey - France 10/21
  4. Tania Richmond UJM 10/16
  5. Idy Diop UCAD - Sénégal 05/15
  6. Mohammed Meziani TUD - Germany 06/13
  7. Mohamed El Yousfi TUD - Germany 06/13
  8. Robert Niebuhr TUD - Germany 06/12

Master students

  1. Kalen Couzon Univ. Versailles 04/21 → 09/21
    Side-channel attacks on the NIST finalists
  2. Sékou Diakité AIMS Sénégal 01/16 → 05/16
    Les schémas de signatures et leurs constructions génériques, report.
  3. Brice Odilon Boidje AIMS Sénégal 01/15 → 05/15
    McBits : fast constant-time code-based cryptography, report.
  4. Vlad Dragoi ISFA Univ. Lyon 1 04/13 → 10/13
    Attaques par canaux cachés du schéma de McEliece, report.
  5. Nicolas Nardeau and Wafa Benmoussa Cryptis Univ. Limoges 09/06 → 03/07
    Forme canonique des matrices generatrices des codes quasi-cycliques, report.
  6. Bertrand Zanzotto Cryptis Univ. Limoges 09/05 → 03/06
    Implementation of the Stern Authentication Scheme, report.

Bachelor students

  1. Edward Poon University Ottawa 05/17 → 07/17
    Constant weight encoding function, webpage.
  2. Philippe Niles University Ottawa 05/16 → 07/16
    Constant weight encoding function, webpage.
  3. Amund Desmarais and Rayan Safieddine University Ottawa 05/14 → 07/14
    Software implementation of Goppa decoders, report and webpage.
  4. Quentin Santos L3 ENS Lyon 06/12 → 07/12
    Software implementation of code-based hash functions and stream-ciphers, webpage.
  5. Niklas Buscher and Jan Hendrick TUD - Germany 03/11 → 08/11
    Implementation of the Hybrid McEliece Encryption Scheme HyMES, webpage.
  6. Lucas Rothamel and Manuel Weiel TUD - Germany 03/11 → 08/11
    Implementation of the RFSB hash function,webpage.
  7. Marius Hansen and Daniel Quanz TUD - Germany 03/11 → 08/11
    Code challenge website, webpage.
  8. Julian Oleg Arenz and Sarah Magin TUD - Germany 03/11 → 08/11
    Implementation of signature schemes with additional properties, webpage.
  9. Felix Günther and Holger Rother TUD - Germany 09/10 → 03/11
    Implementation of code-based zero-knowledge identification schemes, webpage.
  10. Matthias Boll and Thorsten Peter TUD - Germany 09/10 → 03/11
    Implementation of code-based hash-functions and stream-ciphers, webpage.
  11. David Meier and Daniel Demmler TUD - Germany 04/10 → 09/10
    Implementation of the Kabatianskii, Krouk Smeet signature scheme, report.
  12. Eric Arnoult L3 ENSTA 05/10 → 07/10
    Implementation of a q-ary version of the Niederreiter cryptosystem, report.
  13. Gerhard Hoffman TUD - Germany 12/09 → 04/11
    Implementation of McEliece using quasi-dyadic Goppa codes, report.