Difference between revisions of "MAT5133"

From Department of Mathematics at UTSA
Jump to navigation Jump to search
(Created page with "Introduction to post-quantum Cryptography.")
 
Line 1: Line 1:
 
Introduction to post-quantum Cryptography.
 
Introduction to post-quantum Cryptography.
 +
 +
 +
'''Sample textbook''':
 +
 +
[1] Daniel Bernstein, Johannes Buchmann, Erik Dahmen, ''Post-Quantum Cryptography'', Springer, 201-
 +
 +
 +
 +
 +
'''Catalog entry'''
 +
 +
''Prerequisite'': Algebra and Number Systems (MAT 1313), or Discrete Mathematical Structures (CS 2233/2231), or instructor consent.
 +
 +
''Contents'':
 +
(1) Propositional logic: Axioms and Rules of Inference. Boolean Algebras. Limitations of propositional logic: Informal introduction to quantifiers and syllogisms.
 +
(2) Predicate Logic: Existential and universal quantification, free variables and substitutions. Discussion of the various axiomatic systems for first-order logic (including axioms and rules of inference). The power and the limitations of axiomatic systems for logic: Informal discussion of the completeness and incompleteness theorems.
 +
(3)Sets and boolean algebras: Operations on sets. Correspondence between finitary set operations and propositional logic. Correspondence between infinitary operations and quantifiers. The power and limitations of the language of set theory: Informal discussion of the set-theoretic paradoxes and the need for axiomatic systems for set theory.
 +
(4) Relations: Properties of relations. Special relations: Equivalence relations, partially ordered sets, totally ordered sets.
 +
(5) Functions: Operations of functions, direct image and inverse image.
 +
(6) Well-ordered sets: Correspondence between well-ordering relations and induction. Correspondence between well-ordering relations and choice functions.
 +
(7) Introduction to computability. Classical models of computation (recursive functions, and Turing models). Limitations of computation (the Halting Problem, the busy beaver problem, fast-growing functions). Contemporary models of computation.
 +
 +
 +
 +
 +
 +
 +
==Topics List==
 +
{| class="wikitable sortable"
 +
! Week !! Topic !! Chapter 1 from the Bernstein-Johannes Buchmann-Dahmen book !! MAT1313, or CS2233/2231, or instructor consent.
 +
|-
 +
|  1-3 
 +
|| [[Introduction to post-quantum cryptography]]
 +
|| 1
 +
|| MAT1313 or CS2233/2231, or equivalent.
 +
|-
 +
|  2-4 
 +
|| [[Quantum computing]]
 +
|| 2
 +
||
 +
|-
 +
|  5-6 
 +
|| [[Hash-based Digital Signature Schemes]]
 +
|| 3
 +
||
 +
|-
 +
|  7-8 
 +
|| [[Code-based cryptography]]
 +
|| 4
 +
||
 +
|-
 +
|  9-10 
 +
|| [[Lattice-based Cryptography]]
 +
|| 5
 +
||
 +
|-
 +
|  11-12 
 +
|| [[Multivariate Public Key Cryptography]]
 +
|| 6
 +
||
 +
|-
 +
|  13-end 
 +
|| [[Homomorphic encryption]]
 +
|| 7
 +
||
 +
|}

Revision as of 10:10, 22 March 2023

Introduction to post-quantum Cryptography.


Sample textbook:

[1] Daniel Bernstein, Johannes Buchmann, Erik Dahmen, Post-Quantum Cryptography, Springer, 201-



Catalog entry

Prerequisite: Algebra and Number Systems (MAT 1313), or Discrete Mathematical Structures (CS 2233/2231), or instructor consent.

Contents: (1) Propositional logic: Axioms and Rules of Inference. Boolean Algebras. Limitations of propositional logic: Informal introduction to quantifiers and syllogisms. (2) Predicate Logic: Existential and universal quantification, free variables and substitutions. Discussion of the various axiomatic systems for first-order logic (including axioms and rules of inference). The power and the limitations of axiomatic systems for logic: Informal discussion of the completeness and incompleteness theorems. (3)Sets and boolean algebras: Operations on sets. Correspondence between finitary set operations and propositional logic. Correspondence between infinitary operations and quantifiers. The power and limitations of the language of set theory: Informal discussion of the set-theoretic paradoxes and the need for axiomatic systems for set theory. (4) Relations: Properties of relations. Special relations: Equivalence relations, partially ordered sets, totally ordered sets. (5) Functions: Operations of functions, direct image and inverse image. (6) Well-ordered sets: Correspondence between well-ordering relations and induction. Correspondence between well-ordering relations and choice functions. (7) Introduction to computability. Classical models of computation (recursive functions, and Turing models). Limitations of computation (the Halting Problem, the busy beaver problem, fast-growing functions). Contemporary models of computation.




Topics List

Week Topic Chapter 1 from the Bernstein-Johannes Buchmann-Dahmen book MAT1313, or CS2233/2231, or instructor consent.
1-3 Introduction to post-quantum cryptography 1 MAT1313 or CS2233/2231, or equivalent.
2-4 Quantum computing 2
5-6 Hash-based Digital Signature Schemes 3
7-8 Code-based cryptography 4
9-10 Lattice-based Cryptography 5
11-12 Multivariate Public Key Cryptography 6
13-end Homomorphic encryption 7