Course Information
Course title
Post-quantum cryptography 
Semester
111-2 
Designated for
COLLEGE OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCE  GRADUATE INSTITUTE OF ELECTRICAL ENGINEERING  
Instructor
YANG, BO-YIN 
Curriculum Number
EE5176 
Curriculum Identity Number
921 U2540 
Class
 
Credits
3.0 
Full/Half
Yr.
Half 
Required/
Elective
Elective 
Time
Friday 7,8,9(14:20~17:20) 
Remarks
The upper limit of the number of students: 50. 
 
Course introduction video
 
Table of Core Capabilities and Curriculum Planning
Table of Core Capabilities and Curriculum Planning
Course Syllabus
Please respect the intellectual property rights of others and do not copy any of the course information without permission
Course Description

COOL 為新版, 請在 NTU Cool 查詢資料。

目前量子電腦技術預估可能在10-20年內成熟。未來如果數千量子位元(qubit)的中大型一般用途量子電腦(General Purpose Quantum Computer)問世,將摧毀現今全世界絕大多數廣泛使用的公鑰密碼系統 (PKC, Public-Key Cryptosystem),例如 RSA、Diffie-Hellman 密鑰交換 (Key Exchange)、橢圓曲線密碼系統(ECC, Elliptic Curve Cryptosystem)。本課程主要介紹可抵擋量子電腦攻擊的公鑰密碼系統,此一研究方向稱為「後量子密碼學」(PQC, Post-Quantum Cryptography)。 

Course Objective
使修習者能初步了解後量子密碼學,為進一步研究打下基礎。

有意參加暑期研習著請洽
https://www.iis.sinica.edu.tw/zh/page/Recruitment/SummerInterns/SummerInterns_2023.html 
Course Requirement
初步理解後量子密碼學並練習實作 
Student Workload (expected study time outside of class per week)
3+6  
Office Hours
Fri. 13:30~14:10 Note: EE2-108 
Designated reading
 
References
1. “Post-Quantum Cryptography”, edited by Daniel J. Bernstein and Johannes Buchmann, Springer-Verlag, 2009,
2. “An Introduction to Mathematical Cryptography” by Jeffrey Hoffstein, Jill Pipher, and Joseph H. Silverman. Springer-Verlag Undergraduate 
Grading
   
Adjustment methods for students
 
Teaching methods
Assisted by video
Assignment submission methods
Extension of the deadline for submitting assignments, Individual presentation replace group presentation
Exam methods
Others
Negotiated by both teachers and students
Progress
Week
Date
Topic
第1週
2/17  Intro to Postquantum Cryptography  
第2週
2/24  Intro to Lattices and Lattice-based Cryptography 
第3週
3/3  Properties of lattices and NTRU 
第4週
3/10  Implementation platforms: ARM, English Lecture, Dr. Matthias Kannwischer 
第5週
3/17  Implementing Post-Quantum Crypto: Short-Limb Multiplications 
第6週
3/24  Implementing Post-Quantum Crypto: Multi-Limb (Polynomial) Multiplications  
第7週
3/31  Hash-Based Cryptography and Multivariate Cryptography
(guest speakers, Prof. Ruben Niederhagen, English lecture, Online Lecture) 
第8週
4/7  Supersingular Isogenies and CSIDH
Introduction to SAGEMATH (guest speaker, Dr. Lorenz Panny, English lecture) 
第9週
4/14  Midterm 
第10週
4/21  More on Lattice-based cryptosystems and Kyber-Dilithium 
第11週
4/28  Code-Based Cryptography: Classic McEliece
(guest speakers, Prof. Daniel J. Bernstein and Prof. Tanja Lange, English lecture, Online Lecture) 
第12週
5/5  Lenstra-Lenstra-Lovasz Algorithm (LLL) and Cryptanalysis with Lattices 
第13週
5/12  More on Lattice-based cryptosystems implementations 
第14週
5/19  Miscellanous topics 
第15週
5/26  Group presentations 
第16週
6/3  Group presentations, Miscellanou Topics (Online)