Arvutiteaduse instituut
Courses.cs.ut.ee Arvutiteaduse instituut Tartu Ülikool
  1. Kursused
  2. 2025/26 kevad
  3. Postkvant Krüptograafia (LTAT.04.015)
EN
Logi sisse

Postkvant Krüptograafia 2025/26 kevad

  • Homepage
  • Lectures
  • Practice Sessions
  • Assignments
  • References

Notes & Slides


Slides, Lecture notes - Quantum Computing and Cryptography

Lecture notes - NIST Standardization Process

Irina's Slides, Lecture notes - Code-Based Cryptography

Lecture notes - Lattice-Based Cryptography

Lecture notes - Hash-Based Cryptography

Lecture notes - Isogeny-Based Cryptography

Lecture-by-lecture


Lecture 1 (11.02): Course introduction, quantum computing, RSA, Shor's algorithm. Motivation to study post-quantum cryptography.

Lecture 2 (18.02): Public-key encryption, key encapsulation mechanism, digital signature schemes, security notions (IND-CPA, IND-CCA) for PKE. An overview of the NIST standardization process.

Lecture 3 (25.02): Irina's lecture. Coding theory basics, definition of error-correcting code, examples, and generator matrix.

Lecture 4 (04.03): Parity-check matrix, Singleton, Hamming, and Gilbert-Varshamov bounds, general decoding problem.

Lecture 5 (11.03): Syndrome decoding problem, reductions, McEliece PKE, security, hash functions, Fujisaki-Okamoto transform, McEliece KEM.

Lecture 6 (18.03): Cyclic codes, HQC PKE, correctness and security, overview of lattice-based schemes, lattice basics (definition, first minimum, fundamental region, sphere packing problem).

Lecture 7 (25.03): Minkowki's theorem, hard problems on lattices (SVP and CVP, and their approximate versions). Good and bad basis, Babai's algorithm, GGH, hash-and-sign.

Lecture 8 (01.04): q-ary lattices, NTRU lattice, NTRU problem, Falcon digital signature.

Lecture 9 (08.04): Updates about PQC. LWE, MLWE, D-LWE, special rounding function, Kyber PKE.

Lecture 10 (15.04): Correctness and comments o Kyber security. SIS, MSIS, average-case and worst-case, high and low-bits, Dilithium digital signature.

Lecture 11 (22.04): Lamport's one-time signature, Winternitz signature, Merkle trees.

Lecture 12 (29.04): Hypertrees, HORS and HORST (few times signature), SPHINCS+.

Lecture 13 (06.05): Elliptic curves, isogenies, hard problems in isogenies, SIDH and CSIDH.

Lecture 14 (13.05): Basics of multivariate cryptography.

Lecture 15 (20.05): From classic to post-quantum cryptography.

Lecture 16 (27.05): Report presentations and course wrap-up :)

  • Arvutiteaduse instituut
  • Loodus- ja täppisteaduste valdkond
  • Tartu Ülikool
Tehniliste probleemide või küsimuste korral kirjuta:

Kursuse sisu ja korralduslike küsimustega pöörduge kursuse korraldajate poole.
Õppematerjalide varalised autoriõigused kuuluvad Tartu Ülikoolile. Õppematerjalide kasutamine on lubatud autoriõiguse seaduses ettenähtud teose vaba kasutamise eesmärkidel ja tingimustel. Õppematerjalide kasutamisel on kasutaja kohustatud viitama õppematerjalide autorile.
Õppematerjalide kasutamine muudel eesmärkidel on lubatud ainult Tartu Ülikooli eelneval kirjalikul nõusolekul.
Courses’i keskkonna kasutustingimused