Course title |
Post-quantum cryptography |
Semester |
111-2 |
Designated for |
COLLEGE OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCE GRADUATE INSTITUTE OF ELECTRICAL ENGINEERING |
Instructor |
YANG, BO-YIN |
Curriculum Number |
EE5176 |
Curriculum Identity Number |
921 U2540 |
Class |
|
Credits |
3.0 |
Full/Half Yr. |
Half |
Required/ Elective |
Elective |
Time |
Friday 7,8,9(14:20~17:20) |
Remarks |
The upper limit of the number of students: 50. |
|
|
Course introduction video |
|
Table of Core Capabilities and Curriculum Planning |
Table of Core Capabilities and Curriculum Planning |
Course Syllabus
|
Please respect the intellectual property rights of others and do not copy any of the course information without permission
|
Course Description |
COOL 為新版, 請在 NTU Cool 查詢資料。
目前量子電腦技術預估可能在10-20年內成熟。未來如果數千量子位元(qubit)的中大型一般用途量子電腦(General Purpose Quantum Computer)問世,將摧毀現今全世界絕大多數廣泛使用的公鑰密碼系統 (PKC, Public-Key Cryptosystem),例如 RSA、Diffie-Hellman 密鑰交換 (Key Exchange)、橢圓曲線密碼系統(ECC, Elliptic Curve Cryptosystem)。本課程主要介紹可抵擋量子電腦攻擊的公鑰密碼系統,此一研究方向稱為「後量子密碼學」(PQC, Post-Quantum Cryptography)。 |
Course Objective |
使修習者能初步了解後量子密碼學,為進一步研究打下基礎。
有意參加暑期研習著請洽
https://www.iis.sinica.edu.tw/zh/page/Recruitment/SummerInterns/SummerInterns_2023.html |
Course Requirement |
初步理解後量子密碼學並練習實作 |
Student Workload (expected study time outside of class per week) |
3+6 |
Office Hours |
Fri. 13:30~14:10 Note: EE2-108 |
Designated reading |
|
References |
1. “Post-Quantum Cryptography”, edited by Daniel J. Bernstein and Johannes Buchmann, Springer-Verlag, 2009,
2. “An Introduction to Mathematical Cryptography” by Jeffrey Hoffstein, Jill Pipher, and Joseph H. Silverman. Springer-Verlag Undergraduate |
Grading |
|
Adjustment methods for students |
Teaching methods |
Assisted by video |
Assignment submission methods |
Extension of the deadline for submitting assignments, Individual presentation replace group presentation |
Exam methods |
|
Others |
Negotiated by both teachers and students |
|
Week |
Date |
Topic |
第1週 |
2/17 |
Intro to Postquantum Cryptography |
第2週 |
2/24 |
Intro to Lattices and Lattice-based Cryptography |
第3週 |
3/3 |
Properties of lattices and NTRU |
第4週 |
3/10 |
Implementation platforms: ARM, English Lecture, Dr. Matthias Kannwischer |
第5週 |
3/17 |
Implementing Post-Quantum Crypto: Short-Limb Multiplications |
第6週 |
3/24 |
Implementing Post-Quantum Crypto: Multi-Limb (Polynomial) Multiplications |
第7週 |
3/31 |
Hash-Based Cryptography and Multivariate Cryptography
(guest speakers, Prof. Ruben Niederhagen, English lecture, Online Lecture) |
第8週 |
4/7 |
Supersingular Isogenies and CSIDH
Introduction to SAGEMATH (guest speaker, Dr. Lorenz Panny, English lecture) |
第9週 |
4/14 |
Midterm |
第10週 |
4/21 |
More on Lattice-based cryptosystems and Kyber-Dilithium |
第11週 |
4/28 |
Code-Based Cryptography: Classic McEliece
(guest speakers, Prof. Daniel J. Bernstein and Prof. Tanja Lange, English lecture, Online Lecture) |
第12週 |
5/5 |
Lenstra-Lenstra-Lovasz Algorithm (LLL) and Cryptanalysis with Lattices |
第13週 |
5/12 |
More on Lattice-based cryptosystems implementations |
第14週 |
5/19 |
Miscellanous topics |
第15週 |
5/26 |
Group presentations |
第16週 |
6/3 |
Group presentations, Miscellanou Topics (Online) |
|