Institute of Computer Science
  1. Courses
  2. 2025/26 spring
  3. Post-Quantum Cryptography (LTAT.04.015)
ET
Log in

Post-Quantum Cryptography 2025/26 spring

  • Homepage
  • Lectures
  • Assignments
  • References

References

  • Daniel J. Bernstein, Johannes Buchmann, and Erik Dahmen. Post-Quantum Cryptography. Springer Science & Business Media. 2009.
  • Jeffrey Hoffstein, Jill Pipher, and J.H. Silverman. An Introduction to Mathematical Cryptography (1st. ed.). Springer Publishing Company, Incorporated. 2008.
  • PQShield, Quantum Computing Threat: An Overview of Post-Quantum Cryptography, https://pqshield.com/wp-content/uploads/2021/02/PQShield-Quantum-Threat-3-An-Overview-of-Post-Quantum-Cryptography-August-2022.pdf
  • NIST, Post-Quantum Cryptography, https://csrc.nist.gov/Projects/post-quantum-cryptography.
  • Peter W. Shor, Algorithms for quantum computation: discrete logarithms and factoring, Proceedings 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, 1994, pp. 124-134.

Links

  • What is lattice-based cryptography? https://thelatticeclub.com/
  • Post-quantum board game: https://cyber.ee/resources/stories/what-about-a-post-quantum-board-game/
  • Institute of Computer Science
  • Faculty of Science and Technology
  • University of Tartu
In case of technical problems or questions write to:

Contact the course organizers with the organizational and course content questions.
The proprietary copyrights of educational materials belong to the University of Tartu. The use of educational materials is permitted for the purposes and under the conditions provided for in the copyright law for the free use of a work. When using educational materials, the user is obligated to give credit to the author of the educational materials.
The use of educational materials for other purposes is allowed only with the prior written consent of the University of Tartu.
Terms of use for the Courses environment