Institute of Computer Science
  1. Courses
  2. 2022/23 spring
  3. Post-Quantum Cryptography (LTAT.04.015)
ET
Log in

Post-Quantum Cryptography 2022/23 spring

  • Main Page
  • Lectures
  • Homeworks
  • Sources

Lectures are on Wednesdays from 10.15 to 12.00 in Delta (Narva mnt 18) - room 2034 and through Panopto (or Zoom), and on Fridays from 10.15 to 12.00 in Delta (Narva mnt 18) - room 2045 and through Panopto (or Zoom). Office hours are on Friday from 13:15 to 14:15 in Delta R3089 (Narva mnt 18).

To join virtually through Zoom, link will be provided.

  • February 15, First Meeting and Introduction to Post-Quantum Cryptography

Lecture 1 -- slides --video

  • February 17, Introduction to NIST Post-Quantum Cryptography Standardization Process

Lecture 2 -- slides -- video

  • February 22, Introduction to NIST Post-Quantum Cryptography Standardization Process

Lecture 3 -- slides -- video 1 -- video 2 -- photos

  • March 3, NIST Post-Quantum Cryptography Standardization Process

Lecture 5 -- video

  • March 8, Introduction to Multivariate Cryptography-1

Lecture 6 -- video -- photos

  • March 10, Introduction to Multivariate Cryptography-2

Lecture 7 -- video -- photos

  • March 17, UOV, Rainbow, LUOV

Lecture 9 -- slides -- video -- photos

  • March 22, Rainbow, MAYO, Gui, Gemms

Lecture 10 -- slides -- video -- photos

  • March 24, Berlekamp Algorithm, MQ-based Identification Schemes, MQDSS

Lecture 11 -- slides -- video -- photos

  • March 29, Introduction to Lattices, LLL Algorithm

Lecture 12 -- slides -- video -- photos

  • March 31, Merkle-Hellman Cryptosystem, GGH Encryption Scheme, NTRUEncrypt

Lecture 13 -- slides -- video -- photos

  • April 5, Regev Encryption Scheme (LWE), Hard Problems, Sieving Algorithms, Enumeration Algorithms

Lecture 14 -- slides -- video -- photos

  • April 12-14, Introduction to Coding Theory (Guest Lecturer)

Lecture 16 -- slides -- video -- photos

  • April 19, Lattice-based Key Exchange Schemes Part 1, Ding12-17, Peikert14

Lecture 17 -- slides -- video -- photos

  • April 21, Lattice-based Key Exchange Schemes Part 2, Peikert14, FRODO KE

Lecture 18 -- slides -- video -- photos

  • April 26, Lattice-based Key Exchange Schemes Part 3, FRODO PKE, FRODO KEM

Lecture 19 -- video -- photos

  • April 28, Lattice-based Key Exchange Schemes Part 4, NewHope

Lecture 20 -- photos

  • May 3, Lattice-based Key Exchange Schemes Part 5, Module-LWE, LWR Problems

Lecture 21 -- video -- photos

  • May 5, Lattice-based Key Exchange Schemes Part 6, Saber KE, Saber PKE

Lecture 22 -- video -- photos

  • May 10, Lattice-based Key Exchange Schemes Part 7, Crystals-Kyber KE, Crystals-Kyber PKE

Lecture 22 -- video -- photos

  • May 10, Isogeny-based Cryptography, (Guest Lecturer)

Lecture 23

  • May 12, Lattice-based Key Encapsulation Design Strategies and Digital Signature Schemes

Lecture 24 -- video -- photos

  • May 17, Lattice-based Digital Signature Schemes Part 1, GPV07, Rejection Sampling, Bai and Galbraith Scheme

Lecture 25 -- video -- photos

  • May 19, Lattice-based Digital Signature Schemes Part 2, Bai and Galbraith Scheme, Dilithium

Lecture 26 -- video -- photos

  • May 24, Lattice-based Digital Signature Schemes Part 3, Falcon and MITAKA

Lecture 27 -- video -- photos

  • May 26, Exam
  • Institute of Computer Science
  • Faculty of Science and Technology
  • University of Tartu
In case of technical problems or questions write to:

Contact the course organizers with the organizational and course content questions.
The proprietary copyrights of educational materials belong to the University of Tartu. The use of educational materials is permitted for the purposes and under the conditions provided for in the copyright law for the free use of a work. When using educational materials, the user is obligated to give credit to the author of the educational materials.
The use of educational materials for other purposes is allowed only with the prior written consent of the University of Tartu.
Terms of use for the Courses environment