| Topic name | Tutor | Student
|
| Theoretical foundations of stream
ciphers | Helger Lipmaa | Petteri Kaski
|
| Decorrelation and stream ciphers | Kaisa Nyberg | Mika Kojo
|
| Differential cryptanalysis w.r.t. different
groups | Helger Lipmaa | Johan Wallén
|
| NSS signature scheme | Helger Lipmaa and Ari Renvall | Sven
Laur
|
| Security of SHA-1 | Helger Lipmaa | M. Olavi Saarinen
|
| Construction of efficient authenticated data structures | Helger
Lipmaa | Lauri Tarkkala
|
| Cryptographic bulletin boards | Ahto Buldas and Helger Lipmaa | Oleg Mürk
|
| Fast proof of access in wireless network | Hannu Kari | Catharina Candolin
|
| Using addresses bound cryptographically to keys
for securing neighbour discovery in IPv6 | Hannu Kari | Henrik
Petander
|
| Auctioning protocol for providing QoS for wireless
users | Hannu Kari | Yuchen Zhou
|