The Cryptography and Information Security Group is part of the Theory Group of MIT's Computer Science and Artificial Intelligence Laboratory. This page is very much under construction. Please add CIS theses you have written or supervised. Archive an electronic copy of your thesis in /b/cis/WWW/theses Thank You!
Note: recent MIT theses may also be available electronically from MIT Theses Online.
Shen, Emily Pattern Matching Encryption, Strategic Equivalence of Range Voting and Approval Voting, and Statistical Robustness of Voting Rules, February 2013. PDF
Sutherland, Andrew V. Order Computations in Generic Groups, June 2007. pdf (740KB)
Peikert, Chris Cryptographic Error Correction, July 2006. PDF (510 KB)
Hohenberger, Susan Advances in Signatures, Encryption, and E-Cash from Bilinear Groups, May 2006. PDF file (1.4 MB)
Fu, Kevin Integrity and access control in untrusted content distribution networks, September 2005. PDF file (700K)
Garfinkel, Simson L. Design Principles and Patterns for Computer Systems That Are Simultaneously Secure and Usable, May 2005. PDF file (31MB)
Clarke, Dwaine Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data, May 2005. PDF File (822K)
Boyko, Victor On All-or-Nothing Transforms and Password-Authenticated Key Exchange Protocols, May 2000 (version of 5/28/00, with some clarifications added as compared to the submitted version of 5/22/00). Gzipped Postscript File (360K) Postscript File (1584K)
Sahai, Amit NEW Frontiers in zero knowledge, June 2000.
Gennaro, Rosario Theory and Practice of Verifiable Secret Sharing, June 1996.
Bellare, Mihir Randomness in Interactive Proofs, August 1991.
Sherman, Alan Cryptology and VLSI: A Two-Part Dissertation, October 1986.
Hastad, Johan Computational Limitations for Small Depth Circuits., May 1986.
Chor, Benny Two Issues in Public Key Cryptography: RSA Bit Security and A New Knapsack Type System, May, 1985. (Note: This thesis won the 1985 ACM Distinguished Dissertation Award.)
Charles Z. Liu Performance Optimazation of a Split-Value Voting System, June 2015. pdf
Marco Pedroso The Implementation of a Split-Value Verifiable Voting System, January, 2015. pdf
Madars Virza Snarks for C: Verifying Program Executions Succinctly and in Zero Knowledge, 2014. pdf
Jason K. Juang Practical Implementation and Analysis of Hyper-Encryption, May 2009. pdf (491KB)
Christopher Y. Crutchfield Security Proofs for the MD6 Hash Function Mode of Operation, June 2008. pdf
Emily Shen End-to-End Verifiability for Optical Scan Voting Systems, June 2008. pdf (415KB)
Waseem S. Daher POSH: A Generalized CAPTCHA With Security Applications, June 2008. pdf (1.2MB)
Vo, Binh A Fair Payment System with Online Anonymous Transfer , October 2006 PDF (809K)
Forsythe, Joy Marie Encrypted Receipts for Voter-Verified Elections Using Homomorphic Encryption. September 2005. pdf
Wilson, David A. Error-Free Message Transmission in the Universal Composability Framework. May 2005. PDF
Wagner, Ryan Graph-Based Privacy Preference Expression for the Semantic Web, May 2004. pdf (4,238KB)
Clarke, Dwaine SPKI/SDSI HTTP Server / Certificate Chain Discovery in SPKI/SDSI , September 2001. PDF File (566K)
Maywah, Andrew J. An Implementation of a Secure Web Client Using SPKI/SDSI Certificates, June 2000. Postscript File (7104K)
Burstein, Jeffrey An Implementation of MicroMint, May 1998.
Elien, Jean-Emile Certificate Discovery Using SPKI/SDSI 2.0 Certificates , May 1998. (Acrobat) Also available in Postscript and DVI formats.
Elcock, Gillian D. Web-Based User Interface for a Simple Distributed Security Infrastructure (SDSI) , June 1997.
Herschberg, Mark A. Secure Electronic Voting Using the World Wide Web, June 1997.
Fredette, Matthew An Implementation of SDSI---The Simple Distributed Security Infrastructure, May 1997. Also available in DVI format.
Zidaric-Sudovacki, Dinko Secure WWW Server for Lotus Notes, February 1996.
Russell, Alexander Necessary and Sufficient Conditions for Collision-Free Hashing, 1993.
Mohtashemi, Mojdeh On the Cryptanalysis of Huffman Codes, June 1992.
Kaliski, Burton S. Design and Reliability of Custom Hardware for DES Cycling Experiments, February 1987.
Sherman, Alan On The Enigma Cryptograph and Formal Definitions of Cryptographic Strength, June 1981.
Pinter, Ronald Using Hyperbolic Tangents in Integer Factoring, February 1980.
Ma, Moses Hsingwen Critical Analysis of Some Public-Key Cryptosystems for High-Speed Satellite Transmission Applications, June 1980.
Michelman, Eric Public-Key Cryptosystems -- An Applications Viewpoint, June 1978.
Chau, David Prototyping a Lightweight Trust Architecture To Fight Phishing, (May 2005). pdf
Kamin, Todd The Free Haven User Interface: Methods for Inserting and Retrieiving Information Stored in Free Haven, May, 2000. (Note: this copy seems to be a preliminary version rather than the final version.)
Sniffen, Brian T. Trust Economies in the Free Haven Project, May, 2000.
Freedman, Michael J. Design and Analysis of an Anonymous Communication Channel for the Free Haven Project, May, 2000.
Maywah, Andrew SPKI/SDSI Secure Web Server Project, May, 1999.
DuRette, Brandon W. Multiple Administrators for Electronic Voting , May 1999.
Grabowski, Holly L. A Survey of World Wide Web Security, January 1997.
Chu, Yang-hua Implementing a Cryptographic Protocol: Secret Exchange, Spring 1996 (Joint with Gillian Elcock)
Elcock, Gillian Implementing a Cryptographic Protocol: Secret Exchange, Spring 1996 (Joint with Yang-hua Chu)
Kaliski, Burton S. Analysis of Wyner's Analog Encryption Scheme, June 1984.
Wang, Susan S.Y. A Study of Schnorr and Lenstra's Factoring Algorithm, September 1983.
Kohnfelder, Loren M. Towards a Practical Public-Key Cryptosystem, May 1978.