Arvutiteaduse instituut
  1. Kursused
  2. 2025/26 kevad
  3. Postkvant Krüptograafia (LTAT.04.015)
EN
Logi sisse

Postkvant Krüptograafia 2025/26 kevad

  • Homepage
  • Lectures
  • Assignments
  • References

Post-Quantum Cryptography (LTAT.04.015)

Instructor: Maiara F. Bollauf
Contact: maiara.bollauf@ut.ee, Delta 3073
Meetings: WED 10:15-12:00 (Room Delta 2047)/ FRI 10:15-12:00 (Room Delta 2045)
Language: English
Office hours: By appointment

For more information, check the course syllabus

Attending the lectures and practical sessions in person is highly recommended. Otherwise, lecture notes will be available and a Zoom room can be arranged, if necessary.


Description

Classical public-key cryptographic systems are vulnerable to the advances of quantum computation. Post-quantum cryptography (PQC) offers solutions that are believed to remain secure even in the presence of quantum adversaries. This course provides a comprehensive introduction to the major representatives of post-quantum cryptography, including code-based, lattice-based, and hash-based cryptography.

This course will have two tracks: math and coding (implementation). The lectures will be shared, but the assignments will be distinct, according to your chosen track. This enables the student to focus on their objectives and promotes interdisciplinary learning.


Resources

There are no required textbooks for this course. All material will be available in the form of lecture notes, research papers, and supplementary sources. Additional references that students may find useful are listed in References.


Prerequisites

There are no formal prerequisites. Some familiarity with linear algebra, probability, number theory, and algorithm analysis is recommended, but not mandatory. Programming skills and mathematical maturity are useful, depending on your chosen track.


Learning Outcomes

Successful students will be able to:

  1. Explain why quantum computers threaten RSA and other public-key systems.
  2. Understand the basic concepts and importance of post-quantum cryptography.
  3. Learn post-quantum cryptography standardization efforts for encryption, key exchange, and signature schemes.
  4. (Math) Understand the mathematical concepts and assumptions behind the main representatives of post-quantum cryptographic schemes.
  5. (Coding) Implement, evaluate and compare NIST-selected post-quantum algorithms.
  6. Critically evaluate post-quantum cryptographic implementations and migration strategies.

Grading Policy

Grades will be determined as follows:

  • Homeworks/Mini-projects - 50% (about 5, every two weeks)
  • Project - 40%
  • Participation and peer-review - 10%

All submitted work will be graded based on correctness and clarity.

The primary focus of this course is to learn the content. The A/B/C.. thresholds will be according to the university guidelines.


Ethics

Collaboration and the use of external resources are encouraged, subject to the following conditions:

  • You must submit your own written solution, preferably in LaTeX, and clearly list all collaborators, references, and external sources consulted for each problem.
  • You may not submit any solution that you are unable to explain and justify orally.
  • Arvutiteaduse instituut
  • Loodus- ja täppisteaduste valdkond
  • Tartu Ülikool
Tehniliste probleemide või küsimuste korral kirjuta:

Kursuse sisu ja korralduslike küsimustega pöörduge kursuse korraldajate poole.
Õppematerjalide varalised autoriõigused kuuluvad Tartu Ülikoolile. Õppematerjalide kasutamine on lubatud autoriõiguse seaduses ettenähtud teose vaba kasutamise eesmärkidel ja tingimustel. Õppematerjalide kasutamisel on kasutaja kohustatud viitama õppematerjalide autorile.
Õppematerjalide kasutamine muudel eesmärkidel on lubatud ainult Tartu Ülikooli eelneval kirjalikul nõusolekul.
Courses’i keskkonna kasutustingimused