Post-Qunatum Cryptography
Exercise sessions for the Master 1 computer science students of ISIMA.
Term: Spring
Schedule
| # | Topic | Materials |
|---|---|---|
| 1 | Exercise session 1 Modular arithmetic, Chinese remainder theorem, and linear algebra. | |
| 2 | Exercise session 2 Abstract algebra, Shor’s algorithm, and lattice-based cryptography. | |
| 3 | Exercise session 3 Lattice-based cryptography. | |
| 4 | Exercise session 4 Code-based cryptography. | |
| 5 | Exercise session 5 Hash-based cryptography. |