Advanced cryptography

Course objectives

General Objectives Traditional cryptographic tools are insufficient for data protection in emerging scenarios. The objectives of this course consist of presenting several modern cryptographic tools and techniques along with their applications to realize the principle of "security and privacy by design" in the Cyberspace. This course provides both theoretical and practical expertise. Specific Objectives The course will illustrate the power of advanced signature schemes, advanced encryption schemes, verifiable random functions, privacy-preserving proof systems and cryptographic puzzles. A particular focus will be given to concrete applications like e-voting, e-auction, privacy-preserving contact tracing, digital cash, anonymous cryptocurrencies, identity wallet, secure messaging, fighting misinformation, GDPR compliance (right to be forgotten and data minimization principles), practical libraries and tools for advanced cryptography. Knowledge and Understanding: -) Knowledge of the security properties of advanced cryptographic tools. -) Knowledge of the main hardness assumptions, on which the security of advanced cryptographic tools is based. -) Knowledge of the cryptographic schemes currently used in real life. -) Understanding of their (practical and theoretical) properties. Applying knowledge and understanding: -) How to select and combine together the right advanced cryptographic tools for a given application. -) How to analyze the security and efficiency of a system based on advanced cryptographic tools. Critiquing and judgmental skills: The students will be able to judge whether a system is secure or not according to a realistic threat model. Communication Skills: The students will learn how to illustrate the resilience of a digital system to concrete attacks. Ability of learning: The students will obtain the necessary background for a deeper study of the subjects.

Channel 1
IVAN VISCONTI Lecturers' profile

Program - Frequency - Exams

Course program
Introduction on Modern Cryptography, Zero-Knowledge Proofs and Multi-Party Computation Advanced Cryptography for Blockchains Advanced Signatures Post-Quantum Cryptography Cryptographic Protocols Cryptographic Hardware Privacy and Surveillance Library and Tools for Advanced Cryptography
Prerequisites
Knowledge of traditional cryptographic tools.
Books
Boaz Barak: An Intensive Introduction to Cryptography (online) Dan Boneh and Victor Shoup: A Graduate Course in Applied Cryptography (online) Introduction to Modern Cryptography | Revised Third Edition, by Jonathan Katz and Yehuda Lindell, Chapman and Hall/CRC Slides and other resources that the lecturer will make timely available to the students.
Frequency
Attendance is not mandatory but strongly recommended.
Exam mode
There will be specifi questions requiring answers spanning over a large part of the program of the course. The final evaluation will take into account the quality of each answer and the overall view inferred by them. The student is expected to be evaluated through just one written exam, while an oral exam will be used only in exceptional cases.
Lesson mode
Lectures will consist of illustrating the contents of slides and of a whiteboard (and/or a graphics tablet) with interaction and practical examples.
  • Lesson code10616549
  • Academic year2025/2026
  • CourseEngineering in Computer Science and Artificial Intelligence
  • CurriculumSingle curriculum
  • Year1st year
  • Semester2nd semester
  • SSDINF/01
  • CFU6