PhD students:
-
P.P. van Liesdonk,
-
J.N.E. Bos,
Practical privacy, EUT, 24-03-1992
-
E.J.L.J. van Heijst,
Special signature schemes,
EUT, 06-07-1992
-
F.W. Sun,
Decoding techniques and a modulation scheme for band-limited
communications,
EUT, 22-02-1994
-
J. van Tilburg,
Security-analysis of a class of cryptosystems based
on linear error-correcting codes,
EUT, 29-11-1994
-
M. de Boer,
Codes: their parameters and geometry,
EUT, 21-03-1997
-
M. van Dijk,
Secret key sharing and secret key generation,
EUT, 09-12-1997
-
S.I. Nikova,
Bounds for designs in infinite polynomial metric spaces,
EUT, 21-09-1998
-
P.W. Heijnen,
Some classes of codes,
EUT, 27-08-1999
-
S.A. Brands, Rethinking public key infrastructures and digital certificates
- building in privacy, EUT, 04-10-1999
-
P.H.T. Beelen,
Algebraic geometry and coding theory,
TU/e, 24-09-2001
-
S. Parvanova Boumova,
Applications of polynomials to spherical codes
and designs, TU/e, 18-02-2002
-
S. Liu,
Information-theoretic Secret Key agreement, TU/e,
26-02-2002
-
J. Doumen,
Some applications of coding theory in cryptography, TU/e,
06-06-2003
-
O. Kholosha,
Investigations in the design and analysis of
key-stream generators, TU/e, 18-12-2003
-
V. Nikov,
Verifiable secret sharing and applications, TU/e, 07-09-2005
-
E. Jochemsz,
Cryptanalysis of RSA variants using small roots of polynomials,
TU/e, 04-10-2007
-
A. Sidorenko,
Design and analysis of provably secure pseudorandom generators,
TU/e, 29-10-2007
-
M.S. Kiraz,
Secure and fair two-party computation, TU/e, 27-08-2008
-
R. Rezaeian Farashahi,
Curves and Jacobians: Number Extractors and Efficient Arithmetic, TU/e, 27-10-2008
-
J.A. Villegas Bautista, Design of advanced primitives for secure multiparty computation; special shuffles and integer comparison, 29-4-2010.
Second promotor
-
C.L.M. van Pul,
Some distance problems in coding theory,
EUT, 16-01-1987
-
W.J. van Gils,
Design of error-control coding schemes for three problems
of noisy information transmission, storage and processing,
EUT, 05-01-1988
-
G.J.M. van Wee,
Covering codes, perfect codes, and codes from algebraic
curves,
EUT, 04-06-1991
-
G. Fang,
Binary block codes for correcting asymmetric or unidirectional
errors,
EUT, 08-03-1993
-
P.A.H. Bours,
Codes for correcting insertion and deletion errors,
EUT, 22-06-1994
-
M. Struik,
Covering codes,
EUT, 25-10-1994
-
L.M.G.M. Tolhuizen,
Cooperating error-correcting codes and their decoding,
EUT, 26-06-1996
-
B.-J. Koops, The crypto controversy: A key conflict in the information
society, KUB, 06-01-1999
-
M. Stam, Speeding up subgroup cryptosystems, TU/e, 04-06-2003
-
A.A.P. Shudelaro, Electronic payment systems and money laundering,
KUB, 17-10-2003
-
B.H.M. Custers, The power of knowledge, UvT, 22-10-2004
-
S.P. Contini, Case studies in symmetric key cryptography, TU/e, 08-09-2005