Cryptography 2 1000-2M24KI2
The content of the course will be dynamically adapted to the classes' progress. The preliminary plan is as follows (the order is subject to change):
1. Advanced definitions of security (including non-malleability)
2. Theoretical aspects of cryptography (Goldreich-Levin theorem, black-box separations, obfuscation, witness encryption)
3. Bilinear transformations and their applications in cryptography (Boneh-Franklin encryption, BLS signatures)
4. Algorithms of post-quantum cryptography
5. Consensus protocols and algorithms used in blockchain technology
6. Interactive and zero-knowledge proofs (including non-interactive proofs such as NIZK and zk-SNARK)
7. Multiparty computations and homomorphic encryption
8. Introduction to Universal Composability
9. Threshold schemes for encryption and signatures
10. Randomness extractors and their applications in leakage-resistant cryptography
Type of course
Requirements
Mathematical analysis for computer science I
Mathematical analysis for computer science II
Geometry with linear algebra
Languages, automata and computations
Cryptography I
Discrete mathematics
Foundations of mathematics
Probability theory and statistics
Prerequisites
Course coordinators
Assessment criteria
To pass the course, you must pass the exercises and the exam.
To pass the exercises, you must :
• deliver homework and
• pass the mid-term exam
The passing of the exercises is decided by the instructor.
The exam is conducted in written form.
Both the mid-term exam and the exam will consist of two parts:
1. testing knowledge (no materials such as notes and books will be allowed on it)
2. testing skills (without the above restriction)
The final grade for the course will be determined (on the first date) based on the weighted average of the mid-term exam (50%) and the exam results (50%).
Lecture and exercise instructors may decide to increase the grade for particularly active students.
Bibliography
• Jonathan Katz and Yehuda Lindell Introduction to Modern Cryptography
• Dan Boneh and Victor Shoup A Graduate Course in Applied Cryptography
• Oded Goldreich Foundations of Cryptography: Volume 1
• Oded Goldreich Foundations of Cryptography: Volume 2
• Mike Rosulek The Joy of Cryptography
• research papers available freely online
Additional information
Information on level of this course, year of study and semester when the course unit is delivered, types and amount of class hours - can be found in course structure diagrams of apropriate study programmes. This course is related to the following study programmes:
- Bachelor's degree, first cycle programme, Computer Science
- Master's degree, second cycle programme, Computer Science
Additional information (registration calendar, class conductors, localization and schedules of classes), might be available in the USOSweb system: