Post-quantum cryptography is no longer just a futuristic concept, but a necessity in the present day. Anyone who works in the field and ignores its principles and techniques could be left at a severe disadvantage. This course offers a comprehensive overview of post-quantum cryptography.
Day 1 explores quantum-based attacks, lattices, and their applications in schemes and key exchange. Day 2 delves into error-correcting codes, isogenies, and their security implications. Day 3 covers the MQ problem, various schemes, including oil and vinegar, rainbow, and their cryptanalysis.
Other candidates, such as hash-based signatures and MPC-in-the-head signatures, and side-channel attacks, are also discussed. Participants will gain a thorough understanding of post-quantum cryptography and its potential impact on modern cryptography.
High Level Overview of the class topics;
- Introduction to post-quantum cryptography
 - Attacks on DLOG and factoring
 - Lattices and related algorithms
 - LWE and Regev's encryption scheme
 - NTRU and NTRUPrime
 - Codes and cryptosystems
 - Isogenies and elliptic curves
 - MQ problem and its variants
 - Other candidates for PQC
 - Side-channel attacks and countermeasures
 


















