Topic name | Tutor | Student
|
Theoretical foundations of stream
ciphers | Helger Lipmaa | Petteri Kaski
|
Decorrelation and stream ciphers | Kaisa Nyberg | Mika Kojo
|
Differential cryptanalysis w.r.t. different
groups | Helger Lipmaa | Johan Wallén
|
NSS signature scheme | Helger Lipmaa and Ari Renvall | Sven
Laur
|
Security of SHA-1 | Helger Lipmaa | M. Olavi Saarinen
|
Construction of efficient authenticated data structures | Helger
Lipmaa | Lauri Tarkkala
|
Cryptographic bulletin boards | Ahto Buldas and Helger Lipmaa | Oleg Mürk
|
Fast proof of access in wireless network | Hannu Kari | Catharina Candolin
|
Using addresses bound cryptographically to keys
for securing neighbour discovery in IPv6 | Hannu Kari | Henrik
Petander
|
Auctioning protocol for providing QoS for wireless
users | Hannu Kari | Yuchen Zhou
|