Accueil > Research > Students : Bachelor - Master - PhD

Students : Bachelor - Master - PhD

mardi 1er septembre 2009, par Cayrel

Here is the list of the students I have supervised with their reports.

I am supervising (or have supervised) the following people.

 Current PhD students

  1. Mohamed Fall (UCAD - Sénégal) (April 2023 -)
  2. Nicolas Vallet (January 2023 -)
  3. Viet-Sang Nguyen (January 2023 -)

 Former PhD students

  1. Boly Seck (UCAD - Sénégal) (June 2020 - September 2023), report. Ingénieur chez Alstom Lyon
  2. Roumaissa Mahdjoubi (USTHB - Algérie) (June 2015 - March 2022), report.
  3. Lina Mortajine (thèse CIFRE avec Wisekey - France) (March 2018 - October 2021), report. Ingénieure chez ITK Engineering
  4. Tania Richmond (Univ. Jean Monnet) (October 2012 - October 2016), report. Maîtresse de conférences à Nouméa - Nouvelle-Calédonie
  5. Ousmane Ndiaye (Univ. Dakar) (October 2012 - August 2016), report. Maître de conférences UCAD - Sénégal
  6. Mohammed Meziani (TUD) (September 2009 - June 2013), report. Senior Consultant Orange Cyberdefense - Allemagne
  7. Mohamed El Yousfi (TUD) (September 2009 - June 2013), report.
  8. Robert Niebuhr (TUD) (September 2009 - June 2012), report and webpage. Director Inhouse Consulting, Head of GGP at Merck Group - Allemagne
  9. Rosemberg Silva (Univ. Campinas) (September 2009 - September 2011)

 Ph.D. committee

  1. Boly Seck (UJM - UCAD) (September 2023)
  2. Roumaissa Mahdjoubi (USTHB - Algérie) (March 2022)
  3. Lina Mortajine (thèse CIFRE avec Wisekey - France) (October 2021)
  4. Tania Richmond (Univ. Jean Monnet) (October 2016)
  5. Idy Diop (Univ. Dakar) (May 2015)
  6. Mohammed Meziani (TUD) (June 2013)
  7. Mohamed El Yousfi (TUD) (June 2013)
  8. Robert Niebuhr (TUD) (June 2012)

 Master students

  1. Kalen Couzon (Univ. Versailles) (April 2021 - September 2021) Side-channel attacks on the NIST finalists
  2. Sékou Diakité (AIMS Sénégal) (January 2016 - May 2016) Les schémas de signatures et leurs constructions génériques, report.
  3. Brice Odilon Boidje (AIMS Sénégal) (January 2015 - May 2015) McBits : fast constant-time code-based cryptography, report.
  4. Vlad Dragoi (Master ISFA Univ. Lyon 1) (April 2013 - October 2013) Attaques par canaux cachés du schéma de McEliece, report.
  5. Nicolas Nardeau and Wafa Benmoussa (Master Cryptis Univ. Limoges) (September 2006 - March 2007) Forme canonique des matrices generatrices des codes quasi-cycliques, report.
  6. Bertrand Zanzotto (Master Cryptis Univ. Limoges) (September 2005 - March 2006) Implementation of the Stern Authentication Scheme, report.

 Bachelor students

  1. Edward Poon (University Ottawa) (May 2017 - July 2017) Constant weight encoding function, webpage.
  2. Philippe Niles (University Ottawa) (May 2016 - July 2016) Constant weight encoding function, webpage.
  3. Amund Desmarais and Rayan Safieddine (University Ottawa) (May 2014 - July 2014) Software implementation of Goppa decoders, report and webpage.
    Ce travail a été (malheureusement) plagié ici
  4. Quentin Santos (L3 ENS Lyon) (June 2012 - July 2012) Software implementation of code-based hash functions and stream-ciphers, webpage.
  5. Niklas Buscher and Jan Hendrick (TUD) (March 2011 - August 2011) Implementation of the Hybrid McEliece Encryption Scheme (HyMES), webpage.
  6. Lucas Rothamel and Manuel Weiel (TUD) (March 2011 - August 2011) Implementation of the RFSB hash function,webpage.
  7. Marius Hansen and Daniel Quanz (TUD) (March 2011 - August 2011) Code challenge website, webpage.
  8. Julian Oleg Arenz and Sarah Magin (TUD) (March 2011 - August 2011) Implementation of signature schemes with additional properties, webpage.
  9. Felix Günther and Holger Rother (TUD) (September 2010 - March 2011) Implementation of code-based zero-knowledge identification schemes, webpage.
  10. Matthias Boll and Thorsten Peter (TUD) (September 2010 - March 2011) Implementation of code-based hash-functions and stream-ciphers, webpage.
  11. David Meier and Daniel Demmler (TUD) (April 2010 - September 2010) Implementation of the Kabatianskii, Krouk Smeet signature scheme, report.
  12. Eric Arnoult (L3 ENSTA) (Mai 2010-Juillet 2010) Implementation of a q-ary version of the Niederreiter cryptosystem, report.
  13. Gerhard Hoffman (TUD) (December 2009 - April 2011) Implementation of McEliece using quasi-dyadic Goppa codes, report.
SPIP | | Plan du site | Suivre la vie du site RSS 2.0

Habillage visuel © Kozlika sous Licence GPL