Masters Degree students:
-
N.J.C. Lous, The Connection between Truncated BCH-Codes and Y-Constructions
and On Two Encoding Algorithms for Two Classes of Recursively Constructed
Codes, EUT, 26-10-1989.
-
G.V. van Rooij, Authentication Services; Theory and Practice, EUT,
26-10-1989.
-
P.A.H. Bours, Soft Decision Decoding, EUT, 15-02-1990.
-
S.A.W. Roijakkers, Unconditionnally Secure Multiparty Protocols,
EUT, 31-08-1990.
-
J. Francke,Secure multi-party computations; a survey, extended with
some own results, EUT, 21-02-1991.
-
J.J.H. Meijers, The Rao-Nam private-key cryptosystem, a generalization
and attacks, EUT, 25-04-1991.
-
M.J.P. Peeters, The frequency assignment problem as a weighted graph
coloring problem, EUT, 27-06-1991.
-
P.J.M. Veugen, Some mathematical and computational aspects of electronic
cash, EUT, 19-12-1991.
-
V.W. Buskens, Error-correcting codes with bounded running digital sum,
EUT, 25-06-1992.
-
P.M.A. van Gils, Description and cryptologic analysis of an automatic
passage charging system and Development and cryptologic analysis
of an electronic cash system, EUT, 25-06-1992.
-
M.A. de Boer, MDS codes and hyperelliptic function fields, EUT,
10-09-1992.
-
P. Jennissen, Lower order approximations of Boolean functions using
Reed-Muller codes, EUT, 17-12-1992.
-
R. Doyen, On the security of the McEliece public-key cryptosystem with
respect to information set decoding, EUT, 17-12-1992.
-
M.E. van Dijk, Wyner's wire-tap channel and its cryptographic application,
EUT, 29-04-1993.
-
P. Marissen, Errorcorrection beyond the minimum distance in projective
geometry codes, Ou, 30-08-1993.
-
M.M.J. van Weert, An efficient way of constructing certain DeBruijn
sequences, EUT, 04-11-1993.
-
L. Schoonen, Implementation of a zero-knowledge protocol on the Philips
DX-2 smart card and On the use of BIB-designs in broadcast encryption,
EUT, 23-06-1994.
-
K.J. Keuning, Uncoordinated multiple-access channels, EUT, 07-09-1995.
-
P. Schuurman, Part I: Bounds on the state complexity of binary linear
block codes; Part II:Dot codes for product identification: reading and
error-correction, EUT, 21-12-1995.
-
E.J. Eichhorn, Secret sharing schemes: share sizes and structures,
EUT, 27-06-1996.
-
M. Sas, Rijgeneratoren: een informatietheoretische benadering en het
ontwerp van een praktijkvoorbeeld, EUT, 27-06-1996.
-
J. Borst, Public
key cryptosystems using elliptic curves, EUT, 27-02-1997.
-
S. Weijs, A computer search for quasi-cyclic codes, EUT, 03-07-1997.
-
J. Boelaars, De cryptofoon, EUT, 29-08-1997.
-
E.P.E. Cuypers, A design for a safe Internet communication channel with
the help of smartcards, EUT, 30-10-1997.
-
I.J.P. van Overmeeren, Expanding a two-way, two-party authentication
protocol to a three-party authentication protocol, EUT, 30-10-1997.
-
R. Stroeks, Sloppy Alice Attacks on the McEliece cryptosystem and Fault-tolerant
level-modee sequential logic, EUT, 27-08-1998.
-
F. Hagman, Beschikbaarheid, Authenticiteit en Integriteit van Digitale
Publicaties binnen het Nationaal Depot, EUT, 17-12-1998.
-
M. Stam, Toggling schemes for electronic voting, EUT, 06-07-1999.
-
W.M.L. Verspaandonk, Weighted Threshold Schemes, EUT, 31-08-1999.
-
L. Maas, Design and implementation of a program for calculations with points
on an elliptic curve, 23-04-2002.
-
E. van Niekerk, List-decoding algorithms for Reed-Solomon codes, TU/e,
26-08-2003.
-
M. Maas, Pairing-based cryptography, TU/e, 20-04-2004.
-
K.J.M.P. Poels, Quantum key exchange using
squeezed states, TU/e, 16-11-2004.
-
K.P.T. Rietjens, Quantum secret
sharing schemes, TU/e, 16-11-2004.
-
A.J.M. Segers, Algebraic attacks
from a Gröbner basis perspective, TU/e, 16-11-2004.
-
M. Plasmans, White-box cryptography for digital content protection, TU/e,
21-06-2005.
-
R.R. Jacobs, A white-box 3DES algorithm and its applications in conditional access
systems, TU/e, 11-08-2005.
-
T.U. Vladimirova, Collusion resistance of digital fingerprinting schemes,
TU/e, 21-06-2006.
-
R. Beugels, Generalized Hamming weights, TU/e, 29-08-2006.
-
A.C.C. Schoonen, Multiple right-hand side equations, TU/e, 26-08-2008.