Arizona State University

Computer Science (Cybersecurity), PhD

  • Program description
  • At a glance
  • Degree requirements
  • Admission requirements
  • Tuition information
  • Application deadlines
  • Career opportunities
  • Contact information

Computer, Cybersecurity, Information, Information Assurance, Security, approved for STEM-OPT extension, assurance, enggradcs, foundation, network, systems

A degree in computer science is the next step in your journey to become a great leader, innovator, entrepreneur and educator.

The PhD program in computer science with a concentration in cybersecurity is designed for graduate students who want to pursue a thorough education in the area of cybersecurity and information assurance.

The goal of this concentration is to provide students with the knowledge and skills in science and engineering for cybersecurity, including applied cryptography, computer and network security, computer forensics, data and information security and software security.

According to the National Security Agency, information assurance is defined as the set of measures intended to protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality and nonrepudiation. This includes providing restoration of information systems by incorporating protection, detection and reaction capabilities.

Domestic students enrolled in the cybersecurity concentration are eligible for federal fellowships, such as the Department of Defense Information Assurance Scholarship Program and the Federal Cyber Service Scholarship for Service Program. For more information, students can visit the Cybersecurity and Trusted Foundations website

ASU is certified as a National Center of Academic Excellence in Information Assurance Education and a National Center of Academic Excellence in Information Assurance - Research by the National Security Agency and the Department of Homeland Security. Information assurance courseware at ASU has been certified by the Information Assurance Courseware Evaluation Program to satisfy the standards for Information Systems Security Professionals (NSTISSI 4011) and Senior Systems Managers (CNSSI 4012).

This program may be eligible for an Optional Practical Training extension for up to 24 months. This OPT work authorization period may help international students gain skills and experience in the U.S. Those interested in an OPT extension should review ASU degrees that qualify for the STEM-OPT extension at ASU's International Students and Scholars Center website.

The OPT extension only applies to students on an F-1 visa and does not apply to students completing a degree through ASU Online.

  • College/school: Ira A. Fulton Schools of Engineering
  • Location: Tempe
  • STEM-OPT extension eligible: Yes

84 credit hours, a written comprehensive exam, a prospectus and a dissertation

Required Core Areas (9 credit hours) applications (3) foundations (3) systems (3)

Concentration (9 credit hours) CSE 543 Information Assurance and Security (3) Choose two: CSE 539 Applied Cryptography (3) CSE 545 Software Security (3) CSE 548 Advanced Computer Network Security (3)

Research (18 credit hours) CSE 792 Research (18)

Electives and Additional Research (36 credit hours)

Culminating Experience (12 credit hours) CSE 799 Dissertation (12)

Additional Curriculum Information Courses that are used to satisfy the core area requirement cannot be used to satisfy electives or other requirements. A grade of "B" or better is required for core courses.

18 credit hours of CSE 792 Research are required, and up to 54 credit hours are allowed on the plan of study. Students with research credit hours in excess of 18 add these credit hours to their electives and additional research.

Electives include:

  • additional CSE 792 Research credit hours (up to 36 credit hours allowed beyond the required 18)
  • computer science courses of which up to 18 credit hours of CSE 590 and CSE 790: Reading and Conference is allowed
  • up to six credit hours of interdisciplinary electives in other academic units that are subject to program chair approval

When approved by the academic unit and the Graduate College, this program allows 30 credit hours from a previously awarded master's degree to be used for this degree.

A maximum of three credit hours of 400-level coursework may be applied on the plan of study.

Applicants must fulfill the requirements of both the Graduate College and the Ira A. Fulton Schools of Engineering.

Applicants are eligible to apply to the program if they have earned a bachelor's degree in computer science, computer engineering or a closely related area. Most applicants should have earned a master's degree, but exceptional undergraduate applicants may be admitted directly into the doctoral program.

Applicants must have a minimum cumulative GPA of 3.50 (scale is 4.00 = "A") in the last 60 hours of their first bachelor's degree program, or applicants must have a minimum cumulative GPA of 3.50 (scale is 4.00 = "A") in an applicable master's degree program.

All applicants must submit:

  • graduate admission application and application fee
  • official transcripts from every university attended
  • three letters of recommendation
  • a statement of purpose
  • curriculum vitae or resume
  • proof of English proficiency

Additional Application Information An applicant whose native language is not English must provide proof of English proficiency regardless of their current residency.

GRE scores are optional.

If the student is assigned any deficiency coursework upon admission, those classes must be completed with a grade of "C" (scale is 4.00 = "A") or higher within two semesters of admission to the program. Deficiency courses include:

CSE 230 Computer Organization and Assembly Language Programming CSE 310 Data Structures and Algorithms CSE 330 Operating Systems CSE 340 Principles of Programming Languages or CSE 355 Introduction to Theoretical Computer Science

The applicant's undergraduate GPA and depth of preparation in computer science and engineering are the primary factors affecting admission.

SessionModalityDeadlineType
Session A/CIn Person 12/31Final
SessionModalityDeadlineType
Session A/CIn Person 08/01Final

Graduates with a doctorate in computer science are able to analyze, understand and apply key theories and algorithms used in the field of computer science. They are also able to generate and evaluate new theories, algorithms and software modules that can advance the field of computer science. Graduates have a competitive advantage when it comes to securing employment.

Career examples include:

  • computer science researcher
  • computer science security professor
  • data scientist engineer
  • machine learning, AI or computer vision engineer
  • machine learning, AI or computer vision scientist

Computer Science and Engineering Program | CTRPT 105 [email protected] 480-965-3199

click back to top

  • Who’s Teaching What
  • Subject Updates
  • MEng program
  • Opportunities
  • Minor in Computer Science
  • Resources for Current Students
  • Program objectives and accreditation
  • Graduate program requirements
  • Admission process
  • Degree programs
  • Graduate research
  • EECS Graduate Funding
  • Resources for current students
  • Student profiles
  • Instructors
  • DEI data and documents
  • Recruitment and outreach
  • Community and resources
  • Get involved / self-education
  • Rising Stars in EECS
  • Graduate Application Assistance Program (GAAP)
  • MIT Summer Research Program (MSRP)
  • Sloan-MIT University Center for Exemplary Mentoring (UCEM)
  • Electrical Engineering
  • Computer Science
  • Artificial Intelligence + Decision-making
  • AI and Society
  • AI for Healthcare and Life Sciences
  • Artificial Intelligence and Machine Learning
  • Biological and Medical Devices and Systems
  • Communications Systems
  • Computational Biology
  • Computational Fabrication and Manufacturing
  • Computer Architecture
  • Educational Technology
  • Electronic, Magnetic, Optical and Quantum Materials and Devices
  • Graphics and Vision
  • Human-Computer Interaction
  • Information Science and Systems
  • Integrated Circuits and Systems
  • Nanoscale Materials, Devices, and Systems
  • Natural Language and Speech Processing
  • Optics + Photonics
  • Optimization and Game Theory
  • Programming Languages and Software Engineering
  • Quantum Computing, Communication, and Sensing
  • Security and Cryptography
  • Signal Processing
  • Systems and Networking
  • Systems Theory, Control, and Autonomy
  • Theory of Computation
  • Departmental History
  • Departmental Organization
  • Visiting Committee
  • Explore all research areas

Our research is focused on making future computer systems more secure.

We bring together a broad spectrum of cross-cutting techniques for security, from theoretical cryptography and programming-language ideas, to low-level hardware and operating-systems security, to overall system designs and empirical bug-finding.  We apply these techniques to a wide range of application domains, such as blockchains, cloud systems, Internet privacy, machine learning, and IoT devices, reflecting the growing importance of security in many contexts.

phd cryptography

Latest news in security and cryptography

Toward a code-breaking quantum computer.

Building on a landmark algorithm, researchers propose a way to make a smaller and more noise-tolerant quantum factoring circuit for cryptography.

3 Questions: How to prove humanity online

AI agents could soon become indistinguishable from humans online. Could “personhood credentials” protect people against digital imposters?

QS ranks MIT the world’s No. 1 university for 2024-25

Ranking at the top for the 13th year in a row, the Institute also places first in 11 subject areas.

QS World University Rankings rates MIT No. 1 in 11 subjects for 2024

The Institute also ranks second in five subject areas.

This tiny chip can safeguard user data while enabling efficient computing on a smartphone

Researchers have developed a security solution for power-hungry AI models that offers protection against two common attacks.

Upcoming events

Honoring sanjoy mitter, a memorial conference, backflipai-supercharging artists, designers, and engineers using novel 3d ai, ai and the future of your career, eecs career fair, five rings tech talk – demystifying proprietary trading , capital one – tech transformation.

Computer Science

Security and cryptography.

Securing the Internet presents great challenges and research opportunities. Potential applications such as Internet voting, universally available medical records, and ubiquitous e-commerce are all being hindered because of serious security and privacy concerns. The epidemic of hacker attacks on personal computers and web sites only highlights the inherent vulnerability of the current computer and network infrastructure.

Adequately addressing security and privacy concerns requires a combination of technical, social, and legal approaches. Topics currently under active investigation in the department include mathematical modeling of security properties, implementation and application of cryptographic protocols, secure and privacy-preserving distributed algorithms, trust management, verification of security properties, and proof-carrying code. There is also interest in the legal aspects of security, privacy, and intellectual property, both within the department and in the world-famous Yale Law school, with which we cooperate. 

Faculty working in this area:

faculty email website
Timos Antonopoulos  
Joan Feigenbaum
Ben Fisch
Michael Fischer
Anurag Khandelwal
Charalampos Papamanthou
Ruzica Piskac
Zhong Shao
Jakub Szefer
Stephen Slade  
Katerina Sotiraki  
Fan Zhang
Lin Zhong

Highlights in this area:

Joan Feigenbaum has conducted direction-setting research on various aspects of cryptography, security, and privacy for more than thirty years.  For example, she was the co-founder (with Matt Blaze and Jack Lacy) of the security-research area of “trust management.”  In 2020, Blaze, Feigenbaum, and Lacy won the IEEE Symposium on Security and Privacy Test-of-Time Award for their 1996 paper “Decentralized Trust Management.”  Currently, Professor Feigenbaum is working on “socio-technical” issues in the interplay of computer science and law, including the tension between strong encryption and lawful surveillance.

Ben Fisch will start at Yale in 2022 as co-director of the Yale Applied Cryptography Laboratory and Assistant Professor of Computer Science. He is broadly interested in problems related to privacy and verifiability in information systems, with a special attention on applications of cryptography to blockchains. He has worked closely with the blockchain industry, and his research has impacted open source projects including Filecoin, Ethereum, and Chia. His research has focused on various types of cryptographic proof systems, including zero-knowledge proofs, proofs of storage, proofs of correct computation, and verifiable delay functions. 

Michael Fischer is interested in security problems connected with Internet voting, and more generally in trust and security in multiparty computations. He has been developing an artificial society in which trust has a precise algorithmic meaning. In this setting, trust can be learned and used for decision making. Better decisions lead to greater social success. This framework allows for the development and analysis of some very simple algorithms for learning and utilizing trust that are easily implementable in a variety of settings and are arguably similar to what people commonly use in everyday life.

Charalampos Papamanthou is the co-director of the Yale Applied Cryptography Laboratory and an Associate Professor of Computer Science at Yale. Before Yale, he was the Director of the Maryland Cybersecurity Center (MC2) and an Associate Professor of Electrical and Computer Engineering at the University of Maryland, College Park, where he joined in 2013 after a postdoc at UC Berkeley. He works on applied cryptography and computer security—and especially on technologies, systems and theory for secure and private cloud computing. He has received the NSF CAREER award, the Google Faculty Research Award, the Yahoo! Faculty Research Engagement Award, the NetApp Faculty Fellowship, the UMD Invention of the Year Award, the Jimmy Lin Award for Invention, the George Corcoran Award for Excellence in Teaching and was also finalist for the 2020 Facebook Privacy Research award. His research has been funded by federal agencies (NSF, NIST and NSA) and by the industry (Google, Yahoo!, NetApp, VMware, Amazon, Ergo, Ethereum and Protocol Labs). His PhD is in Computer Science from Brown University (2011) and he also holds an MSc in Computer Science from the University of Crete (2005), where he was a member of ICS-FORTH. His work has received over 9,000 citations and he has published in venues and journals spanning theoretical and applied cryptography, systems and database security, graph algorithms and visualization and operations research.

Zhong Shao  leads the FLINT group at Yale, which is applying formal methods to complex security-sensitive systems in such a way that they can guarantee to users that these systems really are trustworthy.  There are several challenges standing in the way of achieving this goal. One challenge is how to specify the desired security policy of a complex system. In the real world, pure noninterference is too strong to be useful. It is crucial to support more lenient security policies that allow for certain well-specified information flows between users, such as explicit declassifications. A second challenge is that real-world systems are usually written in low-level languages like C and assembly, but these languages are traditionally difficult to reason about. A third challenge is how to actually go about conducting a security proof over low-level code and then link everything together into a system-wide guarantee.

Anurag Khandelwal is interested in building cloud-based systems that are secure by construction. His team is currently exploring the design of secure storage systems, where simply storing the data in an encrypted form is insufficient to ensure security: an adversary can launch powerful attacks that use data access patterns to learn damaging information about the data. Existing countermeasures against these attacks remain impractical at the scale of modern storage systems due to large bandwidth and/or storage overheads. His team is exploring how modeling access to the storage as a statistical distribution can enable significantly more scalable solutions that still retain formal security guarantees against practical adversarial settings.

Lin Zhong and his team are interested in the security and privacy of application data in the context of personal and cloud computing. Modern systems often assume the operating system as part of the trusted computing base and as a result, modern operating systems by design have unfettered access to application data. His team is exploring both incremental changes to existing operating systems, e.g., Linux, and clean-slate operating system designs to decouple virtualization, the essential role of operating systems, from data access. They are also exploring the use of machine learning, especially adversarial learning, to minimize privacy-sensitive information in data collected on mobile and IoT devices.

Joining the Group

UT Austin is an excellent place for research in cryptography and theoretical computer science, and we are actively recruiting top students. Please see below for details on how to join the group.

Prospective PhD students: If you are a prospective PhD students interested in cryptography, please apply to the Computer Science program at UT Austin. When filling out your application, there are places where you can indicate your interest in working with us ( Brent Waters and David Wu ). Our admission process is decided by a committee, so emailing us individually is unlikely to help, and due to the volume of requests we receive, we will generally not be able to evaluate your chances based on your profile.

Current PhD students: If you are a current PhD student at UT Austin and are interested in cryptography, we encourage you to take our graduate course in cryptography (CS 388H). Feel free to email us directly if you are interested in working with us.

Current undergraduates: If you are a current undergraduate student at UT Austin and you have taken one of our courses in cryptography (e.g., CS 346 or CS 388H), then please email us to see if there are research opportunities available. In your email, please include your resume and any relevant coursework or project experience you may have.

Summer internships: We do not typically take interns from other institutions. In general, we will not have bandwidth to respond to these requests.

Penn's Security and Privacy Lab

  • Publications

The security and privacy lab at the University of Pennsylvania performs fundamental research in the areas of cryptography, blockchain, anonymous communication, differential privacy, and programming language security.

Andreas Haeberlen

Andreas Haeberlen

Brett Hemenway Falk

Brett Hemenway Falk

Pratyush Mishra

Pratyush Mishra

Sebastian Angel

Sebastian Angel

Tal Rabin

Alireza Shirzad

Bharath Namboothiry

Bharath Namboothiry

David Cao

Elizabeth (Eli) Margolin

Felix Adena

Felix Adena

Jess Woods

Karan Newatia

Eleftherios Ioannidis

Eleftherios Ioannidis

Martin Sander

Martin Sander

Tushar Mopuri

Tushar Mopuri

Yifan cai

Affiliated Faculty

Aaron Roth

Benjamin Pierce

Eric Wong

Jonathan M. Smith

Steve Zdancewic

Steve Zdancewic

Security and Privacy lab at the University of Pennsylvania

phd cryptography

  • Ph.D. Program

Information Security is a multi-disciplinary interest group of faculty and students who work together across department lines. Students can join by applying to the Computer Science Department . All of our students receive support, including an annual stipend, in the form of external and internal competitive fellowships, research fellowships, or teaching fellowships. As a PhD candidate, you will share in the excitement of discovery as you collaborate with our faculty on cutting edge research . You also will acquire strong, independent research skills and begin to develop your own skills and reputation as a member of the research community.

You will find the work here challenging and personally rewarding. Students who complete our PhD program are well-prepared for careers in academia, research, government and industry. Please visit our Graduate Admissions Information page for application requirements, deadlines, and other important information.

Prospective Ph.D. students should review our publications and related security papers and contact us at [email protected] .

Research Areas

  • Health and Medical Security
  • Cryptography & Privacy
  • Graduate Studies at ISI
  • MSSI Course Distribution
  • Capstone Project
  • Dual-Degree Opportunities
  • Cybercorps: Scholarship for Service Program
  • Part-Time and Online Programs (Engineering for Professionals)

Johns Hopkins University | Whiting School of Engineering

8 cryptography PhD positions

Filtered by.

  • cryptography

Refine Your Search

  • Netherlands 3
  • Luxembourg 1
  • United Kingdom 1
  • ; University of Southampton 2
  • Delft University of Technology 1
  • Institute of Photonic Sciences 1
  • NTNU - Norwegian University of Science and Technology 1
  • Technical University of Munich 1
  • University of Amsterdam 1
  • University of Groningen 1
  • Computer Science 5
  • Economics 1
  • Education 1
  • Medical Sciences 1

PhD Position in Code-Based Cryptography

cryptography to deal with the threat posed by quantum computation? Do you enjoy working in a team of young and motivated researchers? We are seeking a PhD student to carry out cutting-edge research in

PhD Studentship: Transforming Cybersecurity by Fortifying Digital Infrastructures for the Quantum Age

quantum computers. Quantum computing technology, leveraging Shor’s algorithm, is expected to dismantle existing public-key cryptography . This jeopardizes the security of modern digital infrastructures like

Up to 9 PhD-positions available within the FLIGHT fellowship program (MSCA-COFUND action)

photodamage under the sun?”. Prof. Dr. Nicoletta Liguori ar ICFO and Dr. Marta da Silva at IRTA. IT009: “FPGA-based hardware acceleration for Post Quantum Cryptography (PQC) and Quantum Key Distribution (QKD

PhD on the topic: Privacy Preserving Computer Architectures (1.0 FTE)

environment in close collaboration with Dr. Erika Covi’s group. Knowledge of cryptography is an added advantage. Knowledge of emerging technologies (ReRAM, PCM, etc.) is an added advantage. Organisation

PhD Position in Systems Security

(or equivalent) degree in Computer Science, Mathematics, or a closely related field by the time of the appointment Strong background in mathematics, or cryptography A good understanding of information

PhD Candidate in Reference Systems for a Cyber-Physical Range

, cryptography , digital forensics, security in e-health and welfare technology, intelligent transportation systems and malware. The Department of Information Security and Communication Technology is one of seven

PhD Studentship: A New Lightweight Cryptographic Protocol With Public Blockchain Integration for Privacy Preserving Federated Learning in Resource-Constrained IoT Networks

update integrity. Privacy-preserving aggregation methods, including differential privacy, homomorphic cryptography , and secure multiparty computation have been used to enhance federated learning privacy

PhD Position in Privacy-Preserving and Reliable Artificial Intelligence

mathematics, (theoretical) computer science, machine learning foundations, electrical engineering, information theory, cryptography , statistics or a related field. - Advanced knowledge of probability theory

Searches related to cryptography

  • computer science
  • mathematics
  • postdoctoral
  • computer science cryptography
  • coding theory

We use cookies to help our site work, to understand how it is used, and to tailor ads that are more relevant to you and your interests.

By accepting, you agree to cookies being stored on your device. You can view details and manage settings at any time on our cookies policy page.

Person pointing finger at screen

Cryptography

Offering an arsenal of techniques to provide effective protection against the increasing cyber threat, cryptography is an integral part of many of our research projects.

With outstanding expertise in this field, we focus on advanced techniques and applications such as high-function encryption schemes and digital signatures, authentication and key exchange protocols, and cryptographic solutions for privacy-preserving identity management, secure data sharing and information exchange.

Global authority on cryptography

Our Centre’s research into hardware security and cryptography is led by Professor Liqun Chen , previously principal research scientist in the Security and Manageability Laboratory at Hewlett Packard Labs. Professor Chen has invented or co-invented cryptographic solutions which have been incorporated into international standards and used in applications millions of people use every day.

Having been instrumental in developing the Trusted Platform Module (TPM) – a hardware chip that ensures security by integrating cryptographic keys and algorithms in devices – Professor Chen is currently focused on helping to develop a Quantum-Resistant TPM and researching other aspects of post-quantum cryptography.

Professor Chen serves as a UK expert on the development of international standards for cryptographic mechanisms (ISO/IEC JTC 1 SC 27 Working Group 2). In addition to reviewing a range of this working group’s ISO/IEC standards, she directly serves as:

  • Editor of ISO/IEC 11770-7, IT Security technology – Key management – Part 7: Cross-domain password-based authenticated key exchange
  • Co-editor of ISO/IEC 20008-3, IT Security technology – Anonymous digital signatures – part 3: Mechanisms using multiple public keys

Professor Chen is also involved in the British Standard Institutes IST/33-2 sub-committee, serving as its vice chairman. This committee makes the UK’s contributions to ISO/IEC JTC 1 SC 27/WG 2.

Read more about the Future TPM project .

Student projects

Our PhD students are conducting an important body of research in the field of cryptography, with a number sponsored by external companies and government. Two students are collaborating with ObjectTech – a company aimed at delivering ‘seamless travel’ through airports, borders and events – to explore lattice-based cryptography for blockchain applications, making them more secure against future technological advances.

Other student projects are focused on post-quantum cryptography research, developing algorithms resistant to attacks by quantum computers which will be required by Trusted Platform Modules in the future.

UCL logo

Cybersecurity MPhil/PhD

London, Bloomsbury

It has long been recognised that cybersecurity is a ‘wicked problem’ – one that spills across disciplines, jurisdictions, and borders of all kinds. Our programme breaks with disciplinary tradition to rethink how we develop people equipped to deal with the cybersecurity challenges of the future.

UK tuition fees (2024/25)

Overseas tuition fees (2024/25), programme starts, applications accepted.

Applications closed

  • Entry requirements

A minimum of an upper second-class Bachelor's degree in a relevant subject from a UK university or an overseas qualification of an equivalent standard.

The English language level for this programme is: Level 2

UCL Pre-Master's and Pre-sessional English courses are for international students who are aiming to study for a postgraduate degree at UCL. The courses will develop your academic English and academic skills required to succeed at postgraduate level.

Further information can be found on our English language requirements page.

If you are intending to apply for a time-limited visa to complete your UCL studies (e.g., Student visa, Skilled worker visa, PBS dependant visa etc.) you may be required to obtain ATAS clearance . This will be confirmed to you if you obtain an offer of a place. Please note that ATAS processing times can take up to six months, so we recommend you consider these timelines when submitting your application to UCL.

Equivalent qualifications

Country-specific information, including details of when UCL representatives are visiting your part of the world, can be obtained from the International Students website .

International applicants can find out the equivalent qualification for their country by selecting from the list below. Please note that the equivalency will correspond to the broad UK degree classification stated on this page (e.g. upper second-class). Where a specific overall percentage is required in the UK qualification, the international equivalency will be higher than that stated below. Please contact Graduate Admissions should you require further advice.

About this degree

This programme provides you with core skills and knowledge at the forefront of computing, cybercrime, and digital technology policy. Our multidisciplinary approach ensures that you achieve deep domain-specific expertise, while developing into individuals who can resolve problems using a range of tools and methods and confident in your ability to work effectively with experts from across the socio-technical divide.

We offer supervision in computing (systems security, cryptography, software security, network security), crime science (cybercrime and policing issues) and in domestic and international policy (digital tech policy, global cybernorms, international peace and security).

You will develop a level of expertise in your topic that incorporates the dimensions covered in our Centre for Doctoral Training (CDT) and you will leave with a network of colleagues working in and across these domains.

Who this course is for

This MPhil/PhD is for applicants with a strong interest or background in cybersecurity issues who would like to undertake multidisciplinary research to solve today’s societal problems and explore innovative solutions. It is suitable for both Master's graduates as well as early or mid-career professionals.

What this course will give you

UCL is ranked 9th globally and 5th in Europe in the QS World University Rankings 2024 , giving you an exciting opportunity to study at one of the world's best universities.

UCL is one of the UK's elite Academic Centres of Excellence in Cyber Security and hosts the UK Research Institutes in Science of Cyber Security (RISCS). The team is led by UCL Computer Science , a department ranked first in England and second in the UK for research power in Computer Science and Informatics in the most recent Research Excellence Framework ( REF2021 ).

Over 40 members of faculty with internationally recognised expertise across all aspects of cybersecurity run a diverse and ambitious portfolio of projects, working closely with industry and policy partners. You will learn from leading academic experts with an outstanding reputation in the field.

Acknowledging that technology alone cannot address the challenges of cyber insecurity, the Department of Science, Technology, Engineering and Public Policy focuses on improving knowledge exchange between technical and policy stakeholders. Providing advice and support to both industry and government around the world, STEaPP runs a portfolio of funded projects that explore how cybersecurity impacts at the societal level as well as on international peace and security.

The foundation of your career

Depending on your research agenda, the programme will provide you with core skills and knowledge at the forefront of computing (systems security, cryptography, software security, network security), crime science (cybercrime) and policy (information security management, public policy). Suitable careers will include technology R&D, intelligence and policing, international and domestic public policy, cyber diplomacy and digital infrastructure project implementation.

Employability

Investing in people and skills and deepening the partnership between government, academic and industry is the first pillar of the UK National Cyber Strategy. To help address this, you will be trained in how to work with evolving cybersecurity challenges through multidisciplinary means. By developing a holistic understanding of how technology, policy, industry and law enforcement interact, you will be equipped for high-level leadership positions that will help to shape the future through secure digital technologies.

The CDT is conveniently located in the heart of London and subsequently has strong links with both industry and policy stakeholders. The three partner departments in the CDT between them host the Information Security Group, the Jill Dando Institute of Security and Crime Science, the Dawes Centre for Future Crime, the Research Institute for Science of Cyber Security, the Digital Technologies Policy Lab and the PETRAS National Centre of Excellence for Cybersecurity of the Internet of Things. All of these offer exceptional networking platforms for the CDT candidates who become part of our research community .

Teaching and learning

You are   assigned a first and second supervisor who  you  will meet regularly.  You  will have a choice of research groups which you can assign yourself to. These research groups meet regularly for seminars and related activities in the departments.

In year 1, you are a ssessed through the completion of a literature review, a six-month research project, a systematic literature review group project, and an integrated assessment that draws on the material delivered across the taught modules.

You will go on to participate in an upgrade viva (MPhil to PhD) between months 15 and 24.

During your research degree, you will have regular meetings with your primary supervisor, in addition to contact with your secondary supervisor and participation in group meetings. Full-time study should comprise of 40 hours per week.

Research areas and structure

Supervision within this programme is available in an extensive range or research areas including:

  • artificial intelligence (AI)
  • applied cryptography
  • on-line propaganda / hate speech / fake news
  • authentication and verification
  • financial technology and cryptocurrencies
  • blockchains
  • global politics of cybersecurity, cyberwar, cyber norms
  • national cyber security strategies
  • systems modelling
  • security economics
  • smart contracts
  • distributed systems security
  • network security
  • the Internet of Things
  • security testing
  • secure software engineering methodologies
  • malware and binary analysis
  • watermarking and copyright protection
  • cybercrime, child protection, and dark marketplaces
  • cyber risk and cyber security policy
  • standards and regulation of digital and telecommunications
  • connected autonomous vehicles
  • gender issues and tech abuse
  • hacking and hacktivism
  • privacy, censorship, surveillance
  • applications to secure communications
  • quantum computing, quantum information theory

Research environment

The departments are very well-connected with research groups across the university, and are involved in many exciting multi-disciplinary research projects.

The CDT provides a 4-year programme of training in cutting-edge disciplinary skills in computing, social sciences and humanities, as well as transferable skills relating to cross sector and cross disciplinary communication, teamwork, public dissemination and professional practice.

This is achieved through a combination of structured compulsory and elective taught modules and training activities, as well as an `apprenticeship’ model involving hands-on personal and team-based research under the supervision of a lead in the field of cybersecurity.

Find out more on our CDT website.

This programme is not currently running a part-time option.

Some projects will call for fieldwork and you will be able to apply to the Research Training Support Grant for funding to support this. Supervisory teams provide contacts and introductions where needed to help you maximise the value of your fieldwork.

All CDT candidates will undertake a placement as part of their programme. Supervisory teams work with candidates and with our industry and policy partners to devise an appropriate placement for each case. These are integrated into the research project to support and enhance it while also offering valuable insights into `real world' cybersecurity problems and work environments.

Accessibility

Details of the accessibility of UCL buildings can be obtained from AccessAble accessable.co.uk . Further information can also be obtained from the UCL Student Support and Wellbeing Services team .

Fees and funding

Fees for this course.

Fee description Full-time Part-time
Tuition fees (2024/25) £6,035 £3,015
Tuition fees (2024/25) £31,100 £15,550

The tuition fees shown are for the year indicated above. Fees for subsequent years may increase or otherwise vary. Where the programme is offered on a flexible/modular basis, fees are charged pro-rata to the appropriate full-time Master's fee taken in an academic session. Further information on fee status, fee increases and the fee schedule can be viewed on the UCL Students website: ucl.ac.uk/students/fees .

Additional costs

Your research degree may be subject to an Additional Fee Element (AFE). The AFE (also known as bench fees) is an additional cost, incurred by yourself or your sponsor. It is levied to cover the costs related to consumables, equipment and materials etc. which are not included in the tuition fee. As each research project is unique in nature, the AFE is calculated on a student-by-student basis and is determined by your academic supervisor.

For more information on additional costs for prospective students please go to our estimated cost of essential expenditure at Accommodation and living costs .

Funding your studies

The Cybersecurity CDT does not have UKRI-funded studentships available for the 2024/25 academic year. Potential candidates who may have other sources of funding available to them — such as from industry, non-UK governments, or their own resources — should consult the CDT’s website where advice will be posted as it becomes available.

For a comprehensive list of the funding opportunities available at UCL, including funding relevant to your nationality, please visit the Scholarships and Funding website.

For a comprehensive list of the funding opportunities available at UCL, including funding relevant to your nationality, please visit the Scholarships and Funding website .

CSC-UCL Joint Research Scholarship

Value: Fees, maintenance and travel (Duration of programme) Criteria Based on academic merit Eligibility: EU, Overseas

All applicants are asked to identify and contact potential supervisors before making an application.

Please note that you may submit applications for a maximum of two graduate programmes (or one application for the Law LLM) in any application cycle.

Got questions? Get in touch

Computer Science

Computer Science

[email protected]

UCL is regulated by the Office for Students .

Prospective Students Graduate

  • Graduate degrees
  • Taught degrees
  • Taught Degrees
  • Applying for Graduate Taught Study at UCL
  • Research degrees
  • Research Degrees
  • Funded Research Opportunities
  • Doctoral School
  • Funded Doctoral Training Programmes
  • Applying for Graduate Research Study at UCL
  • Teacher training
  • Teacher Training
  • Early Years PGCE courses
  • Primary PGCE courses
  • Secondary PGCE courses
  • Further Education PGCE programme
  • How to apply
  • The IOE approach
  • Teacher training in the heart of London
  • Why choose UCL?
  • Entrepreneurship
  • Inspiring facilities and resources
  • Careers and employability
  • Your global alumni community
  • Your wellbeing
  • Postgraduate Students' Association
  • Your life in London
  • Accommodation
  • Funding your Master's

We have 14 Computer Science (cryptography) PhD Projects, Programmes & Scholarships

Computer Science

All locations

Institution

All Institutions

All PhD Types

All Funding

Computer Science (cryptography) PhD Projects, Programmes & Scholarships

Ai-driven hybrid security framework utilizing classical and post-quantum cryptography, phd research project.

PhD Research Projects are advertised opportunities to examine a pre-defined topic or answer a stated research question. Some projects may also provide scope for you to propose your own ideas and approaches.

Self-Funded PhD Students Only

This project does not have funding attached. You will need to have your own means of paying fees and living costs and / or seek separate funding from student finance, charities or trusts.

Security and Privacy in Quantum Cryptography

Phd in post-quantum cryptography, funded phd project (students worldwide).

This project has funding attached, subject to eligibility criteria. Applications for the project are welcome from all suitably qualified candidates, but its funding may be restricted to a limited set of nationalities. You should check the project and department details for more information.

Chaos-based cryptography

Blockchain-enhanced federated learning for dynamic traffic prediction, reductions in cryptography: subversion resilience, funded phd project (uk students only).

This research project has funding attached. It is only available to UK citizens or those who have been resident in the UK for a period of 3 years or more. Some projects, which are funded by charities or by the universities themselves may have more stringent restrictions.

Large Language Models (LLMs) for Cryptographic and Cybersecurity Threat Model Building

An intelligent, secured lightweight algorithm for 6g iot apps, post-quantum cryptographic systems for securing communication in iot systems., substitution boxes for image encryption applications using choas, blockchain-based ecosystem to combat fake news, behavioural analysis for ransomware and extortion-based attack detection, conditional sampling and property testing of probability distributions for cryptographic applications, phd mathematical sciences, funded phd programme (students worldwide).

Some or all of the PhD opportunities in this programme have funding attached. Applications for this programme are welcome from suitably qualified candidates worldwide. Funding may only be available to a limited set of nationalities and you should read the full programme details for further information.

China PhD Programme

A Chinese PhD usually takes 3-4 years and often involves following a formal teaching plan (set by your supervisor) as well as carrying out your own original research. Your PhD thesis will be publicly examined in front of a panel of expert. Some international programmes are offered in English, but others will be taught in Mandarin Chinese.

FindAPhD. Copyright 2005-2024 All rights reserved.

Unknown    ( change )

Have you got time to answer some quick questions about PhD study?

Select your nearest city

You haven’t completed your profile yet. To get the most out of FindAPhD, finish your profile and receive these benefits:

  • Monthly chance to win one of ten £10 Amazon vouchers ; winners will be notified every month.*
  • The latest PhD projects delivered straight to your inbox
  • Access to our £6,000 scholarship competition
  • Weekly newsletter with funding opportunities, research proposal tips and much more
  • Early access to our physical and virtual postgraduate study fairs

Or begin browsing FindAPhD.com

or begin browsing FindAPhD.com

*Offer only available for the duration of your active subscription, and subject to change. You MUST claim your prize within 72 hours, if not we will redraw.

phd cryptography

Create your account

Looking to list your PhD opportunities? Log in here .

Filtering Results

Cryptography Research Group

Paul G. Allen School of Computer Science & Engineering University of Washington

phd cryptography

The Cryptography Group in the Paul G. Allen School of Computer Science & Engineering carries out research on a wide range of topics in the foundations and applications of cryptography. These include public-key and symmetric cryptography, obfuscation, attribute-based and functional encryption, secure multi-party computation, zero-knowledge proofs, anonymous credentials, post-quantum and quantum cryptography, information-theoretic cryptography, and more.

We meet weekly for a reading group/seminar . Also subscribe to seattle-crypto for annoucements of cryptography-related events in the Seattle area.

Check out our cryptography classes .

Our research has been supported by NSF, DARPA, the Simons Foundation, the Sloan Foundation, CISCO, JP Morgan, and Microsoft.

Related groups: [UW Theory] [UW Security & Privacy] [MSR Cryptography, Security, and Privacy] [UW Blockchain Lab]

phd cryptography

Graduate Students

phd cryptography

Former Members

John Retterer Moore MS 2015

Wei Dai MS 2016 → UCSD (PhD) → Bain Capital Crypto (Research Partner)

Binyi Chen PhD 2019 → Google → Espresso Systems (Chief Cryptographer)

Michael Agun PhD 2019 → Western Digital

Pratik Soni PhD 2020 → CMU (postdoc) → University of Utah (Assistant Professor)

Xihu Zhang MS 2022 → Oracle

Ashrujit Ghoshal PhD 2022 → CMU (postdoc)

Viet Tung Hoang Postdoc 2015-16 → Florida State University ( Assistant Associate Professor)

Christian Matt Postdoc 2017-18 → Concordium (Senior Researcher)

Aishwarya Thiruvengadam Postdoc 2017-18 → TU Darmstadt (Postdoc) → IIT Madras (Assistant Professor)

Marshall Ball Postdoc 2020-21 (CI Fellow) → New York University (Assistant Professor)

Joseph Jaeger Postdoc 2019-21 → Georgia Institute of Technology (Assistant Professor)

Tianren Liu Postdoc 2019-21 → Peking University (Assistant Professor)

What a lovely hat

Is it made out of tin foil .

IACR logo

International Association for Cryptologic Research

The International Association for Cryptologic Research (IACR) is a non-profit scientific organization whose purpose is to further research in cryptology and related fields. Cryptology is the science and practice of designing computation and communication systems which are secure in the presence of adversaries.

crypto

Photo: John Wiley User:Jw4nvc - Santa Barbara, California [ CC BY 3.0 ], via Wikimedia Commons

Crypto 2024

18 - 22 august 2024 santa barbara, usa.

asiacrypt

Photo: Mikael Kristenson

Asiacrypt 2024

9 - 13 december 2024 kolkata, india.

eurocrypt

Photo: Pixabay

Eurocrypt 2025

4 - 8 may 2025 madrid, spain.

tcc

Photo: pxhere.com , CC0 Public Domain

Theory of Cryptography Conference

2 - 6 december 2024 milan, italy.

fse

Photo: John-Mark Smith

Fast Software Encryption

17 - 21 march 2025 rome, italy.

rwc

Photo: by Kenny Paterson

Real World Crypto Symposium

26 - 28 march 2025 sofia, bulgaria.

pkc

The International Conference on Practice and Theory in Public Key Cryptography

12 - 15 may 2025 røros, norway.

ches

Photo: GraphicCycle [ CC BY-SA 4.0 ], via Wikimedia Commons

Cryptographic Hardware and Embedded Systems

14 - 18 september 2025 kuala lumpur, malaysia.

CHES: CHES 2024: Cryptographic Hardware and Embedded Systems Kuala Lumpur, Malaysia, 14 September - 18 September 2025

Event Calendar: TPMPC 2025: 11th Theory and Practice of Multi-Party Computation Workshop Bangalore, India, 3 March - 6 March 2025

Event Calendar: ACISP 2025: 30th Australasian Conference on Information Security and Privacy Wollongong, Australia, 14 July - 16 July 2025

Event Calendar: ICNBT 2025: 4-th International Conference on Network Security and Blockchain Technology West Bengal, India, 14 January - 16 January 2025

Job Posting: PhD Students and/or Postdoctoral Researchers The chair of IT Security, Brandenburg University of Technology, Cottbus-Senftenberg

Job Posting: PhD Student in Cryptography Chalmers University of Technology, Department of Computer Science & Engineering, Gothenburg, Sweden

Job Posting: Tenured/Tenure-track faculty Chinese Academy of Sciences, Academy of Mathematics and Systems Science

Job Posting: Ph.D student and Postdoctoral Researcher Hebrew University of Jerusalem

Publications

Journal of Cryptology

Journal of Cryptology

Vincent Rijmen, Editor-in-chief Published by Springer-Verlag since 1988

Conference Proceedings

Conference Proceedings

Regional and Area Conferences Published by Springer-Verlag since 1984

Open Access Journals

Transactions on Symmetric Cryptography

Transactions on Cryptographic Hardware and Embedded Systems

IACR ePrint Archive

IACR ePrint Archive

Joppe W. Bos & Matthias J. Kannwischer, Co-editors Established 2000

Recent Awards

PKC Test-of-time award, PKC 2007, Traceable Ring Signature

TCC Test-of-time award, TCC 2007, Multi-authority Attribute Based Encryption

TCC Best Young Researcher Award, TCC 2023, Memory Checking for Parallel RAMs

Best Paper Award, CRYPTO 2023, Fast Practical Lattice Reduction through Iterated Compression

Best Early Career Paper, CRYPTO 2023, Fully Adaptive Schnorr Threshold Signatures

Featured Video

Screenshot of featured video

  • Press Enter to activate screen reader mode.

Applied Cryptography Group

Directly go to the content, eth zürich: overview and news, the applied cryptography group was founded in april 2019. it is led by prof. kenny paterson and is part of the institute of information security. we are affiliated with the zurich information security and privacy center (zisc)., our group researches and educates on the applications of cryptography, which underpins secure systems. our research area ranges from enabling communication services that ensure confidentiality and integrity, to advanced methods such as searching over encrypted data, drawing broadly from theoretical computer science, mathematics, and engineering..

For more information on our activities see our Research and Publications pages, as well as Education for courses and for open Student Projects.

Quick links

  • Directories

Cryptography

Related faculty.

Neal Koblitz

Neal I. Koblitz

Kristin Lauter

Kristin Lauter

Latest news.

  • Neil Koblitz is the co-recipient of the 2021 Levchin Prize (February 22, 2021)
  •   Calendar
  •   Linkedin
  •   News Feed
  •   Alumni Update

Department of Mathematics

  • Math Research

Cryptology Research at Boise State University

Members of the cryptology group at BSU work in areas of cryptography and cryptanalysis, and in several areas of number theory and combinatorics. The contributing faculty are Liljana Babinkostova and Marion Scheepers.

Babinkostova’s cryptographic research interests include elliptic curves, cryptanalysis, post-quantum and lightweight cryptography, and cyber-physical systems security.

Scheepers’ cryptographic research interests include analysis and design of cryptographic primitives, post-quantum and lightweight cryptography, and algorithmic complexity.

The Algebra-Geometry-Cryptology (AGC) seminar meets every week to discuss our ongoing research and the research of others in our field. Students are welcome to attend.

BoiseCrypt Conference

BoiseCrypt is a conference at which undergraduate and graduate students present the results of their projects focused on cryptography and related areas. During the period 2009-2015 the conference was organized by L. Babinkostova.

The Department of Mathematics offers several undergraduate and graduate level cryptography courses. The graduate level courses in cryptography are offered through the master’s program in mathematics and the Computing PhD program .

Undergraduate

  • MATH 305: Introduction to Algebra and Number Theory
  • MATH 307: Foundations of  Cryptology
  • MATH 308: Introduction to Algebraic Cryptology
  • MATH 337: Introduction to Cyber-Physical Systems Security
  • MATH 387: Introduction to Combinatorics
  • MATH 406: Number Theory
  • MATH 408: Advanced Public Key Cryptography and Cryptanalysis
  • MATH 409: Symmetric Key Cryptography and Cryptanalysis
  • MATH 584: Topics in Computational Algebra
  • MATH 585: Topics in Cryptology
  • MATH 506: Number Theory
  • MATH 507 Advanced Number Theory
  • MATH 667: Advances in Applied Cryptography
  • MATH 508: Advanced Public Key Cryptography and Cryptanalysis
  • MATH 509: Symmetric Key Cryptography and Cryptanalysis
  • VIP 500: Device Security From the Sky to the Pancreas

Current students

  • William Unger is a graduate student in the PhD Program in Computing. He is studying lightweight cryptography, security of industrial control-systems, and side channel attacks under the supervision of L. Babinkostova.
  • Erik Corrington is an undergraduate student in the Computer Science Department (BSU) and currently is doing research under the supervision of L. Babinkostova. His research focuses on investigating the security of SEL RTAC (Real Time Automation Controller) device.
  • Jesus Vargas is a graduate student in the Master Program of Mathematics (BSU). He is studying the algebraic structure of certain types of lightweight cryptosystems under the supervision of L. Babinkostova.
  • Antonio Garcia is working on his senior thesis in mathematics under the supervision of L. Babinkostova. He is studying Edwards curves and their application to cryptography.

Past students

  • Neeraja Julakanti completed her MSc thesis in cryptography (BSU 2005) under the supervision of M. Scheepers. Her thesis “A Chosen Ciphertext attack” focuses on analysis & implementation of different attacks on RSA and ECC. Currently she works as a software consultant in T-mobile.
  • Dusty Hinkel completed his MSc thesis in number theory (BSU 2007) under the supervision of M. Scheepers. His thesis “An investigation of Lucas sequences” focuses on the study of the algebraic structure of the Lucas sequences. In 2014 he completed his PhD thesis in number theory from University of Arizona. Since 2015 he works as an engineer in Raytheon and his work focuses on designing algorithms and their implementation in missile software.
  • Jason Smith completed his MSc thesis in number theory (BSU 2009) under the supervision of M. Scheepers. His thesis “Solvability characterizations of Pell-like equations” focuses on the study of Pell equations and their applications to cryptography. Currently he is a lecturer in the Department of Mathematics at BSU.
  • Brandon Barker completed his research in the area of cryptography (BSU 2015) under the supervision of L. Babinkostova. He investigated the security of certain USB devices when the authentication protocol is established using a version of AES and DES. His research resulted in a joint article with Michael Smith (BSU) titled Techniques to enhance security of an authentication protocol in the 2015 NCUR Proceedings. His research was supported by the NSF STEP grant. In 2018 he joined Schweitzer Engineering Laboratories where he works as a software engineer.
  • Suzanne Craig completed her honors thesis in cryptography (BSU 2016) under the supervision of L. Babinkostova. Her research focused on algebraic structures of AES over a field of characteristic greater than two and was supported by the NSF STEP grant. Her thesis resulted in an article in the 2014 NCUR Proceedings titled A simplified AES with field characteristic 7. She is now a graduate student in the Department of Mathematics at University of Colorado – Boulder.
  • Spencer Nelson completed his MsC thesis in number theory and graph theory (BSU 2017) under the supervision of M. Scheepers. His thesis “The Random Graph and Reciprocity Laws” focuses on graphs in which the vertices are the prime numbers and edges are defined only when two vertices are quadratic residues of each other. Currently he is a graduate student in the Department of Mathematics at University of Arizona.
  • Nathan Schmidt completed his MSc thesis in cryptography (BSU 2017) under the supervision of L. Babinkostova. He investigated the security of the hash function Grostl through the study of latin squares. He built software tools in C and Java to efficiently generate and analyze latin squares for applications to cryptography. In 2019 he joined AmeriBen-IEC Group where he works as a senior software developer.
  • Cahlen Humphreys completed his research and a senior thesis in number theory (BSU 2013) under the supervision of L. Babinkostova. His thesis research which resulted in an article in the 2013 NCUR proceedings titled “Prime numbers and the convergents of a continued fraction.” In 2015 he completed his MSc thesis in the Mathematics Department at Florida Atlantic University. His MSc thesis research is in the area of cryptanalysis – algebraic attacks on KeeLoq. In 2017 he joined zData Inc. where he works as a big data engineer.
  • Charles Burnell completed his senior thesis in number theory (BSU 2018) under the supervision of L. Babinkostova. His research focused on investigation of the properties of elliptic pairs. In 2018 he joined Google where he worked as a software developer.

Become a cryptographer or cryptanalyst

A cryptographer develops algorithms, ciphers and security systems to protect sensitive information. A cryptanalyst analyzes the security of cryptographic systems.

Students working with computer and notebook

You are the code maker and the code breaker, the professional who ensures that private data regarding finance, national security and other important spheres are hidden from cyber-terrorists.

Have Questions?

Contact Liljana Babinkostova or Marion Scheepers .

  • Michael Reichle got a paper accepted at CRYPTO 2024. Congratulations!
  • Cecilia Boschini got a paper accepted at CRYPTO 2024. Congratulations!
  • Julia Kastner and Michael Reichle got a paper accepted at CRYPTO 2024. Congratulations!
  • Michael Reichle got a paper accepted at PKC 2024. Congratulations!
  • Dennis Hofheinz, Kristina Hostáková, Roman Langrehr, and Bogdan Ursu got a paper accepted at PKC 2024. Congratulations!
  • Dennis Hofheinz, Kristina Hostáková, Julia Kastner, Karen Klein, and Akin Ünal got a paper accepted at PKC 2024. Congratulations!
  • Roman Langrehr got a paper accepted at TCC 2023. Congratulations!
  • Sebastian Faller and Kristina Hostáková got a paper accepted at ASIACRYPT 2023. Congratulations!
  • Julia Kastner got a paper accepted at ACM CCS 2023. Congratulations!
  • Michael Klooß is visiting from 7.08.-11.08. Welcome Michael!
  • Thomas Attema is visiting from 10.07.-11.08. Welcome Thomas!
  • Adam O'Neill and Ojaswi Acharya are visiting from 30.05.-3.06. Welcome Adam and Ojaswi!
  • The Information Security lecture (co-held with the Information Security Group) was awarded the VIS Teaching Award for Best Interaction. Congratulations!
  • Sebastian Faller got a paper accepted at CRYPTO 2023. Congratulations!
  • Dennis Hofheinz, Julia Kastner, and Karen Klein got a paper accepted at CRYPTO 2023. Congratulations!
  • Akin Ünal won the Early Career Best Paper Award at EUROCRYPT 2023 with his paper "Worst-Case Subexponential Attacks on PRGs of Constant Degree or Constant Locality". Congratulations Akin!
  • Bogdan Ursu graduated with his thesis titled "New Constructions of Round-Efficient Zero-Knowledge Proofs". Congratulations Bogdan!
  • Dennis Hofheinz got a paper accepted at PKC 2023. Congratulations!
  • Dennis Hofheinz and Suvradip Chakraborty got a paper accepted at EUROCRYPT 2023. Congratulations!
  • Suvradip Chakraborty got a paper accepted at EUROCRYPT 2023. Congratulations!
  • Akin Ünal got a paper accepted at EUROCRYPT 2023. Congratulations!
  • Nicholas Brandt got a paper accepted at Financial Crypto 2023. Congratulations!
  • Michael Reichle is visiting from 12.12.-15.12. Welcome Michael!
  • Erkan Tairi is visiting from 28.11.-2.12. Welcome Erkan!
  • Christoph Striecks is visiting from 19.9.-23.9. Welcome Christoph!
  • Karen Klein got a paper accepted at ASIACRYPT 2022. Congratulations!
  • Thomas Attema is visiting from 12.9.-16.9. Welcome Thomas!
  • David Niehues is visiting from 5.9.-9.9. Welcome David!
  • Julia Kastner got a paper accepted at ASIACRYPT 2022. Congratulations!
  • Nicholas Brandt, Dennis Hofheinz, Julia Kastner, and Akin Ünal got a paper accepted at TCC 2022. Congratulations!

manual title

  • template text: Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum
  • XYZ graduated
  • XYZ got a paper accepted at UVW.

Administration

Phd students, motivation..

Cryptography is a crucial tool for securing information systems. Cryptographic building blocks ensure the secrecy and integrity of information, and help to protect the privacy of users. Still, most actually deployed cryptographic schemes are not known to have any rigorously proven security guarantees. This has led to a number of far-reaching security issues in widely deployed software systems.

Our goal is to provide practical cryptographic building blocks that come with rigorously proven security guarantees. These building blocks should be efficient enough for the use in large-scale modern information systems, and their security should be defined and formally analyzed in a mathematically rigorous manner.

Technical interests.

We are interested in the foundations of theoretical cryptography, and in general ways to derive constructions and security guarantees in a modular fashion. One research focus in our group concerns new cryptographic building blocks such as indistinguishability obfuscation, functional encryption, and fully homomorphic encryption. We are particularly interested in the design and analysis of cryptographic schemes in the public-key setting. This covers common tools like public-key encryption and digital signatures, specifically in realistic modern scenarios (such as settings with adaptive adversaries, and a huge number of users).

This information concerns the “Digital Signatures” lecture in the Spring 2023 semester at ETH. The content for this course will be provided through Moodle.

This information concerns the “Information Security” lecture in the Spring 2023 semester at ETH. The content for this course will be provided through Moodle.

Information about the course will be communicate to the subscribed participants via email.

Available Theses

Learning Parity with Noise is a mathematical problem on whose intractability several advanced cryptographic primitives are based. While LPN is similar to Learning With Errors it has received less attention than its lattice-based pendants. However, there are signs that some cryptographic primitives can be achieved by LPN, but not by LWE (Indistinguishability Obfuscation and VOLE e.g.). In this thesis, we will study a variation of LPN that is given over large fields (instead of bits). Our aim is to find new subexponential attacks on LPN, where we put our focus on algebraic attacks. A student interested in this thesis should have some basic knowledge in commutative algebra (polynomial rings and ideals).

  • Compressing Vector OLE The Hardness of LPN over Any Integer Ring and Field for PCG Applications

Meta-complexity is an exciting field that provides intriguing insights into how computation fundamentally works. In particular, meta-complexity techniques have established some interesting results between complexity theory and cryptography (see [1] ) and seem promising in ruling out some of Impagliazzo's five worlds (see [2] ). The goal of this project is to survey the existing literature on meta-complexity, in particular in connection to the theory of cryptography. A student interested in this topic should have a strong background and interest in theoretical computer science ("Theoretische Informatik" or an equivalent basic TCS course). Knowledge of cryptographic principles is beneficial but not strictly necessary.

  • [1] On the Possibility of Basing Cryptography on BPP =/= EXP [2] A Personal View of Average-Case Complexity

A puncturable signature scheme is a special type of digital signature. It allows a signer to update their signing key sk to sk* such that certain message(s) become unsignable. This turns out to be a useful property in applications such as Proof-of-Stake based blockchains or asynchronous transaction data signing services. The goal of the thesis is to review existing definitions and constructions, understand their advantages and drawbacks, and propose new constructions. Depending on the interest of the candidate, this could either be interesting theoretical constructions or rather constructions with properties useful in practical applications. A student interested in this topic should have basic knowledge of cryptographic principles. To get yourself familiar with the topic, see for example [1] or [2] .

  • [1] Puncturable Signatures and Applications in Proof-of-Stake Blockchain Protocol [2] Puncturable Signature: A Generic Construction and Instantiations

While (group) messaging systems with strong security guarantees are widely used in practice, these protocols either do not scale efficiently to large groups or provide significantly weaker security guarantees. The candidate construction that is currently considered by the IETF MLS working group is called TreeKEM [1] . First security guarantees for (a variant of) TreeKEM against so-called adaptive adversaries, which may choose their targets adaptively, potentially depending on information they have learned while interacting with the scheme, have been proven in [2] . The goal of this project is to improve on these results using a proof technique that is called rewinding. A strong background in security reductions and probability theory is required for this project.

  • [1] The Messaging Layer Security (MLS) Protocol [2] Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement

A blind signature scheme is a special type of signature scheme where through interaction, a user can obtain a signature from a signer on a message of their choice without having to reveal said message. Such schemes find applications in electronic voting, electronic payments as well as anonymous credentials. In [1], Boldyreva introduces a blind variant of the pairing-based BLS signature scheme. The security proof is in the random oracle model (ROM) and uses the interactive One-More-CDH assumption. The algebraic group model (AGM)[2] is an abstract model of computation for groups. In the AGM, any adversary is required to explain how they computed group elements in their output from their input. This explanation can be leveraged by a reduction to solve a hard problem and allows for reductions that are not possible in the standard (group) model. Fuchsbauer, Kiltz, and Loss[2] show that in the AGM, plain BLS signatures can have a tight security reduction to the discrete logarithm problem, circumventing an impossibility result for signature schemes with unique signatures. The goal of this thesis is to investigate whether one can improve the security reduction for the blind variant of BLS using the AGM to obtain security based a non-interactive assumption. Familiarity with cryptographic reductions and assumptions (e.g. from the Information Security course) is strongly recommended for this project. Starting date: September 2023.

  • [1] Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme [2] The Algebraic Group Model and its Applications

When selecting concrete parameters for encryption schemes, one typically aims for „n-bit security” (usually with n = 128), where n-bit security is (informally) defined as “the best attack takes as much time as brute-force trying 2^n keys” or an attack that runs in time t and has advantage ε satisfies t/ε > 2^n [1]. However, the choice of considering t/ε is arbitrary and, for example in group-based schemes there are benefits in considering t^2/ε instead of t/ε (e.g. [2]).

The goal of this project is to consider a 2-dimensional version of security and study how attacks in this setting relate to each other (given an (t,ε)-attack, which (t',ε')-attacks does this imply?), possibly by assuming some properties of the hardness problem (like random self-reduceability), and to study how this notion behaves under reductions (i.e. how reductions affect t and ε and which reductions are preferable in which scenarios).

  • [1] Daniele Micciancio, Michael Walter. “On the Bit Security of Cryptographic Primitives” (EUROCRYPT 2018)
  • [2] Lior Rotem, Gil Segev. “Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for Σ-Protocols” (CRYPTO 2021)

Cachin and Maurer [1] present a 2-party NIKE with unconditional security in the bounded storage model. In this model, all parties have streaming access to a huge uniformly random string (urs), but have only bounded (much smaller than the size of the urs) storage. However, they only analyze the security in a very weak model (later called “light security”). More realistic models, with multiple (potentially dishonest) users have been proposed in [2,3]. The goal of this thesis is to analyze the CM-NIKE in these more realistic models, ideally the strongest possible model (“adaptive dishonest key registration security”).

The work [3] provides a generic transformation from light to adaptive honest key-registration security (where many, but only honest users are allowed). However, their transformation can not be applied here directly due to the non-negligible correctness error of the CM-NIKE.

Possible extensions: - The CM-NIKE comes with a non-negligible correctness error. Can this be improved or is this unavoidable (for unconditional security in the bounded storage model).

  • [1] Christian Cachin and Ueli Maurer. “Unconditional security against memory-bounded adversaries” (Crypto 1997)
  • [2] David Cash, Eike Kiltz, and Victor Shoup. “The Twin Diffie-Hellman Problem and Applications”. (EUROCRYPT 2008)
  • [3] Eduarda S. V. Freire, Dennis Hofheinz, Eike Kiltz, and Kenneth G. Paterson. “Non-Interactive Key Exchange”. (PKC 2013)
  • Our Promise
  • Our Achievements
  • Our Mission
  • Proposal Writing
  • System Development
  • Paper Writing
  • Paper Publish
  • Synopsis Writing
  • Thesis Writing
  • Assignments
  • Survey Paper
  • Conference Paper
  • Journal Paper
  • Empirical Paper
  • Journal Support

PhD Projects in Cryptography

PhD projects in Cryptography are one of the great research daises. It helps scholars to create a good impact on the research world. In fact, the main scope of this area is to bring out the  “data privacy, ease of use, and veracity.”  For this reason, it uses complex math and logic to  create strong encryption and decryption methods. We have listed some interesting ideas in which PhD projects in cryptography can be implemented,

As well, cryptography is present in our daily life applications as follows,

  • Remote electronic polling
  • ATM, smart card
  • biometric-based smartphone passwords
  • military communications
  • e-transaction

Up-to-date Cryptographic Techniques

  • Elliptic Curve Cryptography
  • Post Quantum Cryptography
  • Pairing Based Cryptography
  • Public Key Infrastructure (PKI) Testing
  • Random Bit Generation
  • Homomorphic Encryption
  • Block Encryption and Message Digest

Other Aspects of Security

  • Certificate Generation and Authorities
  • Blockchain Technology
  • Pseudo-Random Function
  • Secret Key Distribution
  • Message Authentication Code
  • Hashing and Digital Signature

Our experts have a scholarly mind to reach the goal line of best security through above all approaches. And also, we are good in other algorithms as follows,

AES, El-Gammal, 3DES, SHA-256, MD5, RC4/5/6, ECDSA, IDEA, Blowfish, Twofish, DEAL, CAST-256, MARS, and etc.

Then in recent days, we are enduring our research on  ‘lightweight cryptography.’  That is to say, it has the aim to attain effective  resource use  despite any domain. On the whole, we are keen on all our activities from top to bottom. To the end, we assure you that you hold the “Grade A” final work from us. Thus have faith in PhD projects in Cryptography to complete your research.

Here, we have enlisted few more research concepts from our PhD projects in Cryptography,

Practical Cryptanalysis - Public Key Cryptosystem using Morphism of Polynomials Problem

A Robust Elliptic Curve Cryptography-Based Mutual Authentication Scheme for Telecare Medical Information Systems(TMIS)

Securing Edge Devices in the Post-Quantum in IoT Using Lattice-Based Cryptography

Secure Authentication based on Delegation for Telecare Medicine Information Systems

A Novel Efficient ECC-Based Pairing-Free CP-ABE for Internet of Things

Encryption and Key Agreement using Security Formalizations and Their Relationships in Information-Theoretic Cryptography

A Cloud-Based Secure Services Management using Cognitive and Biometric Methodologies  

Key Distribution System based on Identity for Link Layer Security in AMI Networks

Tolerating Sensitive-Leakage in Larger Plaintext-Space and Higher Leakage-Rate in Privacy-Aware IoT

Node Localization using LLE based on Patch with Selective Neighborhood

Secure Communication on 5G Nets : True Random Number Generator Approach based on Visible Spectrum

An Efficient QC-LDPC and QC-MDPC Codes based Public Key Encryption Scheme for Cryptanalysis

An Algebraic Codes-Based Quantum Symmetric Cryptosystem

Self-Reference Detection and Discrete Modulation and Continuous-Variable Quantum Key Distribution

QR Codes-Based Visual Cryptography Scheme With Meaningful Shares

Smart Building :A Lightweight and Flexible Encryption Scheme for Sensitive Data Security

Smart Grid-Based An Anonymous Self-Certified Key Distribution Scheme using Elliptic-curve cryptography

An Efficient Client-Side Deduplication of Encrypted Data in Cloud-Based Public Auditing

Authorized public cloud storage auditing scheme based on Identity with hierarchical structure for large-scale user groups

Blind Proxy Re-Signature Scheme using Polynomials Isomorphisms

MILESTONE 1: Research Proposal

Finalize journal (indexing).

Before sit down to research proposal writing, we need to decide exact journals. For e.g. SCI, SCI-E, ISI, SCOPUS.

Research Subject Selection

As a doctoral student, subject selection is a big problem. Phdservices.org has the team of world class experts who experience in assisting all subjects. When you decide to work in networking, we assign our experts in your specific area for assistance.

Research Topic Selection

We helping you with right and perfect topic selection, which sound interesting to the other fellows of your committee. For e.g. if your interest in networking, the research topic is VANET / MANET / any other

Literature Survey Writing

To ensure the novelty of research, we find research gaps in 50+ latest benchmark papers (IEEE, Springer, Elsevier, MDPI, Hindawi, etc.)

Case Study Writing

After literature survey, we get the main issue/problem that your research topic will aim to resolve and elegant writing support to identify relevance of the issue.

Problem Statement

Based on the research gaps finding and importance of your research, we conclude the appropriate and specific problem statement.

Writing Research Proposal

Writing a good research proposal has need of lot of time. We only span a few to cover all major aspects (reference papers collection, deficiency finding, drawing system architecture, highlights novelty)

MILESTONE 2: System Development

Fix implementation plan.

We prepare a clear project implementation plan that narrates your proposal in step-by step and it contains Software and OS specification. We recommend you very suitable tools/software that fit for your concept.

Tools/Plan Approval

We get the approval for implementation tool, software, programing language and finally implementation plan to start development process.

Pseudocode Description

Our source code is original since we write the code after pseudocodes, algorithm writing and mathematical equation derivations.

Develop Proposal Idea

We implement our novel idea in step-by-step process that given in implementation plan. We can help scholars in implementation.

Comparison/Experiments

We perform the comparison between proposed and existing schemes in both quantitative and qualitative manner since it is most crucial part of any journal paper.

Graphs, Results, Analysis Table

We evaluate and analyze the project results by plotting graphs, numerical results computation, and broader discussion of quantitative results in table.

Project Deliverables

For every project order, we deliver the following: reference papers, source codes screenshots, project video, installation and running procedures.

MILESTONE 3: Paper Writing

Choosing right format.

We intend to write a paper in customized layout. If you are interesting in any specific journal, we ready to support you. Otherwise we prepare in IEEE transaction level.

Collecting Reliable Resources

Before paper writing, we collect reliable resources such as 50+ journal papers, magazines, news, encyclopedia (books), benchmark datasets, and online resources.

Writing Rough Draft

We create an outline of a paper at first and then writing under each heading and sub-headings. It consists of novel idea and resources

Proofreading & Formatting

We must proofread and formatting a paper to fix typesetting errors, and avoiding misspelled words, misplaced punctuation marks, and so on

Native English Writing

We check the communication of a paper by rewriting with native English writers who accomplish their English literature in University of Oxford.

Scrutinizing Paper Quality

We examine the paper quality by top-experts who can easily fix the issues in journal paper writing and also confirm the level of journal paper (SCI, Scopus or Normal).

Plagiarism Checking

We at phdservices.org is 100% guarantee for original journal paper writing. We never use previously published works.

MILESTONE 4: Paper Publication

Finding apt journal.

We play crucial role in this step since this is very important for scholar’s future. Our experts will help you in choosing high Impact Factor (SJR) journals for publishing.

Lay Paper to Submit

We organize your paper for journal submission, which covers the preparation of Authors Biography, Cover Letter, Highlights of Novelty, and Suggested Reviewers.

Paper Submission

We upload paper with submit all prerequisites that are required in journal. We completely remove frustration in paper publishing.

Paper Status Tracking

We track your paper status and answering the questions raise before review process and also we giving you frequent updates for your paper received from journal.

Revising Paper Precisely

When we receive decision for revising paper, we get ready to prepare the point-point response to address all reviewers query and resubmit it to catch final acceptance.

Get Accept & e-Proofing

We receive final mail for acceptance confirmation letter and editors send e-proofing and licensing to ensure the originality.

Publishing Paper

Paper published in online and we inform you with paper title, authors information, journal name volume, issue number, page number, and DOI link

MILESTONE 5: Thesis Writing

Identifying university format.

We pay special attention for your thesis writing and our 100+ thesis writers are proficient and clear in writing thesis for all university formats.

Gathering Adequate Resources

We collect primary and adequate resources for writing well-structured thesis using published research articles, 150+ reputed reference papers, writing plan, and so on.

Writing Thesis (Preliminary)

We write thesis in chapter-by-chapter without any empirical mistakes and we completely provide plagiarism-free thesis.

Skimming & Reading

Skimming involve reading the thesis and looking abstract, conclusions, sections, & sub-sections, paragraphs, sentences & words and writing thesis chorological order of papers.

Fixing Crosscutting Issues

This step is tricky when write thesis by amateurs. Proofreading and formatting is made by our world class thesis writers who avoid verbose, and brainstorming for significant writing.

Organize Thesis Chapters

We organize thesis chapters by completing the following: elaborate chapter, structuring chapters, flow of writing, citations correction, etc.

Writing Thesis (Final Version)

We attention to details of importance of thesis contribution, well-illustrated literature review, sharp and broad results and discussion and relevant applications study.

How PhDservices.org deal with significant issues ?

1. novel ideas.

Novelty is essential for a PhD degree. Our experts are bringing quality of being novel ideas in the particular research area. It can be only determined by after thorough literature search (state-of-the-art works published in IEEE, Springer, Elsevier, ACM, ScienceDirect, Inderscience, and so on). SCI and SCOPUS journals reviewers and editors will always demand “Novelty” for each publishing work. Our experts have in-depth knowledge in all major and sub-research fields to introduce New Methods and Ideas. MAKING NOVEL IDEAS IS THE ONLY WAY OF WINNING PHD.

2. Plagiarism-Free

To improve the quality and originality of works, we are strictly avoiding plagiarism since plagiarism is not allowed and acceptable for any type journals (SCI, SCI-E, or Scopus) in editorial and reviewer point of view. We have software named as “Anti-Plagiarism Software” that examines the similarity score for documents with good accuracy. We consist of various plagiarism tools like Viper, Turnitin, Students and scholars can get your work in Zero Tolerance to Plagiarism. DONT WORRY ABOUT PHD, WE WILL TAKE CARE OF EVERYTHING.

3. Confidential Info

We intended to keep your personal and technical information in secret and it is a basic worry for all scholars.

  • Technical Info: We never share your technical details to any other scholar since we know the importance of time and resources that are giving us by scholars.
  • Personal Info: We restricted to access scholars personal details by our experts. Our organization leading team will have your basic and necessary info for scholars.

CONFIDENTIALITY AND PRIVACY OF INFORMATION HELD IS OF VITAL IMPORTANCE AT PHDSERVICES.ORG. WE HONEST FOR ALL CUSTOMERS.

4. Publication

Most of the PhD consultancy services will end their services in Paper Writing, but our PhDservices.org is different from others by giving guarantee for both paper writing and publication in reputed journals. With our 18+ year of experience in delivering PhD services, we meet all requirements of journals (reviewers, editors, and editor-in-chief) for rapid publications. From the beginning of paper writing, we lay our smart works. PUBLICATION IS A ROOT FOR PHD DEGREE. WE LIKE A FRUIT FOR GIVING SWEET FEELING FOR ALL SCHOLARS.

5. No Duplication

After completion of your work, it does not available in our library i.e. we erased after completion of your PhD work so we avoid of giving duplicate contents for scholars. This step makes our experts to bringing new ideas, applications, methodologies and algorithms. Our work is more standard, quality and universal. Everything we make it as a new for all scholars. INNOVATION IS THE ABILITY TO SEE THE ORIGINALITY. EXPLORATION IS OUR ENGINE THAT DRIVES INNOVATION SO LET’S ALL GO EXPLORING.

Client Reviews

I ordered a research proposal in the research area of Wireless Communications and it was as very good as I can catch it.

I had wishes to complete implementation using latest software/tools and I had no idea of where to order it. My friend suggested this place and it delivers what I expect.

It really good platform to get all PhD services and I have used it many times because of reasonable price, best customer services, and high quality.

My colleague recommended this service to me and I’m delighted their services. They guide me a lot and given worthy contents for my research paper.

I’m never disappointed at any kind of service. Till I’m work with professional writers and getting lot of opportunities.

- Christopher

Once I am entered this organization I was just felt relax because lots of my colleagues and family relations were suggested to use this service and I received best thesis writing.

I recommend phdservices.org. They have professional writers for all type of writing (proposal, paper, thesis, assignment) support at affordable price.

You guys did a great job saved more money and time. I will keep working with you and I recommend to others also.

These experts are fast, knowledgeable, and dedicated to work under a short deadline. I had get good conference paper in short span.

Guys! You are the great and real experts for paper writing since it exactly matches with my demand. I will approach again.

I am fully satisfied with thesis writing. Thank you for your faultless service and soon I come back again.

Trusted customer service that you offer for me. I don’t have any cons to say.

I was at the edge of my doctorate graduation since my thesis is totally unconnected chapters. You people did a magic and I get my complete thesis!!!

- Abdul Mohammed

Good family environment with collaboration, and lot of hardworking team who actually share their knowledge by offering PhD Services.

I enjoyed huge when working with PhD services. I was asked several questions about my system development and I had wondered of smooth, dedication and caring.

I had not provided any specific requirements for my proposal work, but you guys are very awesome because I’m received proper proposal. Thank you!

- Bhanuprasad

I was read my entire research proposal and I liked concept suits for my research issues. Thank you so much for your efforts.

- Ghulam Nabi

I am extremely happy with your project development support and source codes are easily understanding and executed.

Hi!!! You guys supported me a lot. Thank you and I am 100% satisfied with publication service.

- Abhimanyu

I had found this as a wonderful platform for scholars so I highly recommend this service to all. I ordered thesis proposal and they covered everything. Thank you so much!!!

Related Pages

Phd Projects In Visual Cryptography

Phd Projects In Web Technology

Phd Projects In System Cybernetics

Phd Projects In Digital Forensics

Phd Projects In Webservice

Phd Projects In Systems And Cybernetics

Phd Projects In Information Forensics Security

Phd Projects In Security

Phd Projects In Networking

Phd Projects In Information Security

Phd Consultancy Services

Phd Projects In Information Technology

Phd Projects In Augmented Reality

Phd Projects In Cybersecurity

Phd Projects In Dependable And Secure Computing

IMAGES

  1. PPT

    phd cryptography

  2. PHD: 'Quantum Cryptography' by Freya Wilson

    phd cryptography

  3. Postdoc and PhD in Cryptography

    phd cryptography

  4. PHD RESEARCH TOPIC IN CRYPTOGRAPHY

    phd cryptography

  5. Applied Cryptography for Researchers and Practitioners

    phd cryptography

  6. PhD Research Topics in Cryptography [Top 6 Interesting Titles]

    phd cryptography

VIDEO

  1. Public Key Infrastructure

  2. Ciphers Fundamentals Lab

  3. Cryptography & Cryptanalysis/ Phd course/2019-2020/Dr. Faez Hassan Ali

  4. PhD in Cryptography with Thomas Zacharias

  5. Emerging Paradigms 1 & 2 + Post-Quantum Signatures 1 & 2 (Crypto 2023)

  6. Chaos Based Image Encryption

COMMENTS

  1. Open Positions in Cryptology

    We are looking for one PhD student who will work on cryptography and privacy-preserving machine learning. The position is a fully funded PhD position. The candidate must hold a Master's degree in Computer Science, Electrical and Computer Engineering, or a related area, and a have a strong background in mathematics and cryptography and good ...

  2. cryptography PhD Projects, Programmes & Scholarships

    A position for a PhD student is available for the Cryptography and Cyber Security Research Group in the Computer Science Research Centre at University of Surrey, UK. Read more. Supervisors: Dr C Li, Dr Y Tian. 6 October 2024 PhD Research Project Funded PhD Project (Students Worldwide) More Details.

  3. Computer Science (Cybersecurity), PhD

    The PhD program in computer science with a concentration in cybersecurity is designed for graduate students who want to pursue a thorough education in the area of cybersecurity and information assurance. ... including applied cryptography, computer and network security, computer forensics, data and information security and software security. ...

  4. NYU Cryptography Group

    Group information. The NYU Cryptography Group researches various aspects of cryptography, from definitions and proofs of security, to cryptographic algorithms and protocol design. Ultimately, we aim to enable the construction and deployment of secure information systems and computing infrastructures. On a high level, our research includes:

  5. Security and Cryptography

    Security and Cryptography. Our research is focused on making future computer systems more secure. We bring together a broad spectrum of cross-cutting techniques for security, from theoretical cryptography and programming-language ideas, to low-level hardware and operating-systems security, to overall system designs and empirical bug-finding.

  6. Applied Cryptography Group

    Applied Cryptography Group. The Applied Crypto Group is a part of the Security Lab in the Computer Science Department at Stanford University. Research projects in the group focus on various aspects of network and computer security. In particular the group focuses on applications of cryptography to real-world security problems.

  7. Security and Cryptography

    His PhD is in Computer Science from Brown University (2011) and he also holds an MSc in Computer Science from the University of Crete (2005), where he was a member of ICS-FORTH. His work has received over 9,000 citations and he has published in venues and journals spanning theoretical and applied cryptography, systems and database security ...

  8. Applicants

    Joining the Group. UT Austin is an excellent place for research in cryptography and theoretical computer science, and we are actively recruiting top students. Please see below for details on how to join the group. Prospective PhD students: If you are a prospective PhD students interested in cryptography, please apply to the Computer Science ...

  9. Penn's Security and Privacy Lab: Home

    The security and privacy lab at the University of Pennsylvania performs fundamental research in the areas of cryptography, blockchain, anonymous communication, differential privacy, and programming language security. Research. Anonymous communication ; Blockchains ; ... Yifeng Mao → PhD student, ...

  10. Ph.D. Program

    Information Security is a multi-disciplinary interest group of faculty and students who work together across department lines. Students can join by applying to the Computer Science Department. All of our students receive support, including an annual stipend, in the form of external and internal competitive fellowships, research fellowships, or teaching fellowships. As a PhD candidate, you will ...

  11. PDF A Graduate Course in Applied Cryptography

    A Graduate Course in Applied Cryptography Dan Boneh and Victor Shoup Version 0.5, Jan. 2020. Preface Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at

  12. Cryptography Research

    The Cryptography Group is part of the Theory and Security groups in the EECS Department at the University of California, Berkeley.. Research in the group spans topics in cryptography from theory to applications. We study foundational questions on subjects such as computing on encrypted data, functional encryption, program obfuscation, verifiable computation, zero-knowlege proofs, and others.

  13. 9 cryptography PhD positions

    PhD Studentship: Transforming Cybersecurity by Fortifying Digital Infrastructures for the Quantum Age. quantum computers. Quantum computing technology, leveraging Shor's algorithm, is expected to dismantle existing public-key cryptography. This jeopardizes the security of modern digital infrastructures like.

  14. Cryptography research

    Our PhD students are conducting an important body of research in the field of cryptography, with a number sponsored by external companies and government. ... Other student projects are focused on post-quantum cryptography research, developing algorithms resistant to attacks by quantum computers which will be required by Trusted Platform Modules ...

  15. Cybersecurity MPhil/PhD

    Who this course is for. This MPhil/PhD is for applicants with a strong interest or background in cybersecurity issues who would like to undertake multidisciplinary research to solve today's societal problems and explore innovative solutions. It is suitable for both Master's graduates as well as early or mid-career professionals.

  16. Computer Science (cryptography) PhD Projects, Programmes ...

    Chaos-based cryptography. Aberdeen University School of Natural and Computing Sciences. These projects are open to students worldwide, but have no funding attached. Therefore, the successful applicant will be expected to fund tuition fees at the relevant level (home or international) and any applicable additional research costs.

  17. Cryptography Research @ UW

    The Cryptography Group in the Paul G. Allen School of Computer Science & Engineering carries out research on a wide range of topics in the foundations and applications of cryptography. These include public-key and symmetric cryptography, obfuscation, attribute-based and functional encryption, secure multi-party computation, zero-knowledge proofs, anonymous credentials, post-quantum and quantum ...

  18. The International Association for Cryptologic Research

    The International Conference on Practice and Theory in Public Key Cryptography 12 - 15 May 2025 Røros, Norway. Photo: GraphicCycle [CC BY-SA 4.0], via Wikimedia Commons. Cryptographic Hardware and Embedded Systems ... PhD Student in Cryptography Chalmers University of Technology, Department of Computer Science & Engineering, Gothenburg, Sweden.

  19. Homepage

    Our group researches and educates on the applications of cryptography, which underpins secure systems. Our research area ranges from enabling communication services that ensure confidentiality and integrity, to advanced methods such as searching over encrypted data, drawing broadly from theoretical computer science, mathematics, and engineering.

  20. Cryptography

    For all academic inquiries, please contact: Math Student Services C-36 Padelford Phone: (206) 543-6830 Fax: (206) 616-6974 [email protected]

  21. Cryptology Research at Boise State University

    MATH 509: Symmetric Key Cryptography and Cryptanalysis; VIP 500: Device Security From the Sky to the Pancreas; Current students. William Unger is a graduate student in the PhD Program in Computing. He is studying lightweight cryptography, security of industrial control-systems, and side channel attacks under the supervision of L. Babinkostova.

  22. Foundations of Cryptography

    PhD Students Alumni Research Motivation. Cryptography is a crucial tool for securing information systems. Cryptographic building blocks ensure the secrecy and integrity of information, and help to protect the privacy of users. Still, most actually deployed cryptographic schemes are not known to have any rigorously proven security guarantees.

  23. PhD Projects in Cryptography

    PhD projects in Cryptography are one of the great research daises. It helps scholars to create a good impact on the research world. In fact, the main scope of this area is to bring out the "data privacy, ease of use, and veracity." For this reason, it uses complex math and logic to create strong encryption and decryption methods.We have listed some interesting ideas in which PhD projects ...