Course detail

Modern Cryptography

FEKT-MPA-MOKAcad. year: 2021/2022

The course covers the topics of modern cryptography and its concrete applications. In particular, the course covers: post-quantum cryptography, lattice-based cryptography, cloud computing, secure data processing, homomorphic encryption, secure multi-party computation, secret sharing, e-voting, blockchain, cryptocurrencies, data privacy, and disclosure risk control.

Learning outcomes of the course unit

Students will obtain theoretical and practical knowledge on current modern cryptography and its concrete applications. In particular, the course focuses on post-quantum cryptography, cloud computing, secure data processing, e-voting, cryptocurrencies, and data privacy.
By passing the course, students will be able to develop modern cryptographic systems based on the topics explained in the course.


Students must have a background in cryptography, algebra and programming equivalent to the knowledge provided by compulsory courses ZKR, CPT or AKR of the Bachelor’s program BPC-IBE.


Not applicable.

Recommended optional programme components

Not applicable.

Recommended or required reading

Bernstein, D.J., Buchmann, J., Dahmen, E.: Post-Quantum Cryptography. Springer. (EN)
Schoenmakers, B.: Lecture Notes Cryptographic Protocols. Technical University of Eindhoven. (EN)
Goldreich, O.: Foundations of Cryptography Volume 2 - Basic Applications. Cambridge University Press. (EN)
Hundepool, A., Domingo-Ferrer, J., et al.: Statistical disclosure control. John Wiley & Sons. (EN)

Planned learning activities and teaching methods

Teaching methods include lectures and computer laboratories. The course is taking advantage of the e-learning (Moodle) system. Teaching methods depend on the type of course unit as specified in article 7 of the BUT Rules for Studies and Examinations.

Assesment methods and criteria linked to learning outcomes

Evaluation of study results follows the Rules for Studies and Examinations of BUT and the Dean's Regulation complementing the Rules for Studies and Examinations of BUT.

Language of instruction


Work placements

Not applicable.

Course curriculum

1. Post-quantum cycles: Introduction to Post-Quantum Cryptography
2. Post-quantum cycles: Lattice-based Cryptography
3. Post-quantum cycles: LWE and RLWE Problems
4. Post-quantum cycles: CRYSTALS-Dilithium Signatures
5. Secure computation cycles: Homomorphic Encryption
6. Secure computation cycles: Fully Homomorphic Encryption and Applications
7. Secure computation cycles: Secret Sharing and Secure Multiparty Computation
8. Secure computation cycles: Secure Multiparty Computation in e-voting and cloud computing
9. Decentralized systems cycles: Blockchain and Smart Contracts
10. Decentralized systems cycles: Cryptocurrencies
11. Data Privacy cycles: Data Anonymization
12. Data Privacy cycles: Differential Privacy, k-anonymity and Record Linkage


The objective of this course is to provide students with detailed theoretical and practical knowledge of modern cryptographic schemes and their concrete application. The course places great emphasis on practical exercises, where students can try and implement individual technologies themselves.

Specification of controlled education, way of implementation and compensation for absences

The content and forms of instruction in the evaluated course are specified by a regulation issued by the lecturer responsible for the course and updated for every academic year.

Classification of course in study plans

  • Programme MPC-IBE Master's, 2. year of study, winter semester, 6 credits, compulsory-optional

Type of course unit



26 hours, optionally

Teacher / Lecturer

Exercise in computer lab

26 hours, compulsory

Teacher / Lecturer


eLearning: opened course