Institute of Computer Science
  1. Courses
  2. 2025/26 spring
  3. Post-Quantum Cryptography (LTAT.04.015)
ET
Log in

Post-Quantum Cryptography 2025/26 spring

  • Homepage
  • Lectures
  • Assignments
  • References

Post-Quantum Cryptography (LTAT.04.015)

Instructor: Maiara F. Bollauf
Contact: maiara.bollauf@ut.ee, Delta 3073
Meetings: WED 10:15-12:00 (Room Delta 2047)/ FRI 10:15-12:00 (Room Delta 2045)
Language: English
Office hours: By appointment

For more information, check the course syllabus

Attending the lectures and practical sessions in person is highly recommended. Otherwise, lecture notes will be available and a Zoom room can be arranged, if necessary.


Description

Classical public-key cryptographic systems are vulnerable to the advances of quantum computation. Post-quantum cryptography (PQC) offers solutions that are believed to remain secure even in the presence of quantum adversaries. This course provides a comprehensive introduction to the major representatives of post-quantum cryptography, including code-based, lattice-based, and hash-based cryptography.

This course will have two tracks: math and coding (implementation). The lectures will be shared, but the assignments will be distinct, according to your chosen track. This enables the student to focus on their objectives and promotes interdisciplinary learning.


Resources

There are no required textbooks for this course. All material will be available in the form of lecture notes, research papers, and supplementary sources. Additional references that students may find useful are listed in References.


Prerequisites

There are no formal prerequisites. Some familiarity with linear algebra, probability, number theory, and algorithm analysis is recommended, but not mandatory. Programming skills and mathematical maturity are useful, depending on your chosen track.


Learning Outcomes

Successful students will be able to:

  1. Explain why quantum computers threaten RSA and other public-key systems.
  2. Understand the basic concepts and importance of post-quantum cryptography.
  3. Learn post-quantum cryptography standardization efforts for encryption, key exchange, and signature schemes.
  4. (Math) Understand the mathematical concepts and assumptions behind the main representatives of post-quantum cryptographic schemes.
  5. (Coding) Implement, evaluate and compare NIST-selected post-quantum algorithms.
  6. Critically evaluate post-quantum cryptographic implementations and migration strategies.

Grading Policy

Grades will be determined as follows:

  • Homeworks/Mini-projects - 50% (about 5, every two weeks)
  • Project - 40%
  • Participation and peer-review - 10%

All submitted work will be graded based on correctness and clarity.

The primary focus of this course is to learn the content. The A/B/C.. thresholds will be according to the university guidelines.


Ethics

Collaboration and the use of external resources are encouraged, subject to the following conditions:

  • You must submit your own written solution, preferably in LaTeX, and clearly list all collaborators, references, and external sources consulted for each problem.
  • You may not submit any solution that you are unable to explain and justify orally.
  • Institute of Computer Science
  • Faculty of Science and Technology
  • University of Tartu
In case of technical problems or questions write to:

Contact the course organizers with the organizational and course content questions.
The proprietary copyrights of educational materials belong to the University of Tartu. The use of educational materials is permitted for the purposes and under the conditions provided for in the copyright law for the free use of a work. When using educational materials, the user is obligated to give credit to the author of the educational materials.
The use of educational materials for other purposes is allowed only with the prior written consent of the University of Tartu.
Terms of use for the Courses environment