Back to course catalog

Post-Quantum Cryptography

  • CL-PQC
  • 3 days


Post-quantum cryptography is no longer just a futuristic concept, but a necessity in the present day. Anyone who works in the field and ignores its principles and techniques could be left at a severe disadvantage. This course offers a comprehensive overview of post-quantum cryptography.

Day 1 explores quantum-based attacks, lattices, and their applications in schemes and key exchange. Day 2 delves into error-correcting codes, isogenies, and their security implications. Day 3 covers the MQ problem, various schemes, including oil and vinegar, rainbow, and their cryptanalysis.

Other candidates, such as hash-based signatures and MPC-in-the-head signatures, and side-channel attacks, are also discussed. Participants will gain a thorough understanding of post-quantum cryptography and its potential impact on modern cryptography.

Participants attending this course will

  • Have a deep understanding of the post-quantum cryptographic landscape
  • Be able to evaluate the security of different cryptographic primitives
  • Be able to select suitable cryptographic algorithms for their specific use case and deployment scenario
  • Have practical experience implementing and using post-quantum cryptographic schemes
  • Understand the mathematical foundations of post-quantum cryptography
  • Be familiar with the state-of-the-art in post-quantum cryptography
  • Possess knowledge and skills to defend against side-channel and physical attacks on cryptographic implementations


  • Introduction to post-quantum cryptography
  • Attacks on DLOG and factoring
  • Lattices and related algorithms
  • LWE and Regev's encryption scheme
  • NTRU and NTRUPrime
  • Codes and cryptosystems
  • Isogenies and elliptic curves
  • MQ problem and its variants
  • Other candidates for PQC
  • Side-channel attacks and countermeasures

Course information


General knowledge of cryptography



Delivery methods

Onsite / Virtual classroom

Table of contents

  • Day 1
  • Day 2
  • Day 3
  • Intro
    • Attacks Against DLOG and Factoring
      • Shor's Algorithm
      • NIST Competition
    • Lattices
      • Definitions
      • SVP, CVP, BDD
      • Good and Bad Basis
      • Babai Nearest Plane Algorithm
      • GGH Schemes and Attack Against Digital Signature Scheme
      • LWE
      • Regev's Encryption Scheme
      • Key Exchange from LWE
      • Ring LWE
      • Module LWE and LWR
      • Frodo, Kyber, Saber
      • NTRU and NTRUPrime
      • SIS Problem, Hash Function, and Digital Signature from SIS
      • Falcon
      • Lyubashevskys's ID Scheme
      • Dilithium
      • IBE and FHE
    • Codes
      • Error Correcting Codes in General
      • Goppa Codes, Decoding Algorithm
      • McEliece Cryptosystem, Cryptanalysis History
      • BIKE and HQC
      • Niederreiter Cryptosystem, Syndrome Decoding
      • Trapdoor One-Way Function
      • Digital Signature Scheme Wave
      • Rank Metric Codes and Cryptosystems
    • Isogenies
      • Crash Course on Isogenies and Elliptic Curves
      • CGL Hash Function and SIDH
      • Security of SIDH, SIKE
      • Group Actions, CSIDH, and Applications
      • SQISign (High-Level Discussion)
    • MQ
      • MQ Problem
      • Discussion about Its Hardness
      • Linearization, Gröbner Basis (High-Level Discussion)
      • Benchmarking Systems
      • Imai-Matsumoto, Hidden Field Equations
      • Variants of HFE
      • Oil and Vinegar Scheme, Kipnis-Shamir Attack, UOV
      • Rainbow and Cryptanalysis Results for Both UOV and Rainbow
      • ID Scheme and GeMSS
    • Other Candidates
      • Hash-Based Signatures (SPHINCS+)
      • MPC-in-the-Head Signatures (Picnic)
    • Side-Channel Attacks
      • Basic Attacks
      • Countermeasures Against Physical and Implementation Attacks

    Get more information

    Send inquiry