Advanced cryptography

Course objectives

General Objectives Traditional cryptographic tools are insufficient for data protection in emerging scenarios. The objectives of this course consist of presenting several modern cryptographic tools and techniques along with their applications to realize the principle of "security and privacy by design" in the Cyberspace. This course provides both theoretical and practical expertise. Specific Objectives The course will illustrate the power of advanced signature schemes, advanced encryption schemes, verifiable random functions, privacy-preserving proof systems and cryptographic puzzles. A particular focus will be given to concrete applications like e-voting, e-auction, privacy-preserving contact tracing, digital cash, anonymous cryptocurrencies, identity wallet, secure messaging, fighting misinformation, GDPR compliance (right to be forgotten and data minimization principles), practical libraries and tools for advanced cryptography. Knowledge and Understanding: -) Knowledge of the security properties of advanced cryptographic tools. -) Knowledge of the main hardness assumptions, on which the security of advanced cryptographic tools is based. -) Knowledge of the cryptographic schemes currently used in real life. -) Understanding of their (practical and theoretical) properties. Applying knowledge and understanding: -) How to select and combine together the right advanced cryptographic tools for a given application. -) How to analyze the security and efficiency of a system based on advanced cryptographic tools. Critiquing and judgmental skills: The students will be able to judge whether a system is secure or not according to a realistic threat model. Communication Skills: The students will learn how to illustrate the resilience of a digital system to concrete attacks. Ability of learning: The students will obtain the necessary background for a deeper study of the subjects.

Channel 1
IVAN VISCONTI Lecturers' profile

Program - Frequency - Exams

Course program
Introduction on Modern Cryptography, Zero-Knowledge Proofs and Multi-Party Computation Recap on Modern cryptography Gentle introduction to Zero-Knowledge and Multi-Party Computation Practical use of libraries for snarks Practical use of libraries for MPC Advanced Cryptography for Blockchains Applications of snarks for Verifiable computation Zcash/TornadoCash/Redactable blockchain/Disinformation: Verifiable Random Functions, Verifiable Delay Functions, TimeLock Puzzles Key storage Random beacon Concrete examples through programming/libraries Advanced Signatures Unique and aggregatable Signatures Blind Signatures Ring/Group Signatures Threshold Signatures Post-Quantum Cryptography Shor and Grover algorithms, the state of affairs with SHA256/AES/RSA/Dlog Lattice assumptions and schemes from lattices Minicrypt constructions Hybrid solutions and concrete examples (programming/libraries) Cryptographic Protocols E-voting with HE, BS, Shuffles E-Auctions, E-Cash Credential systems and EU Digital Identity Wallet Concrete examples through programming/libraries Cryptographic Hardware PUFs and Smart Cards/CIE Intel SGX (and related TEE technologies) Privacy and Surveillance - Contact tracing/CSAM - E2E encryption and secure messaging - Brief overview on other tools
Prerequisites
Knowledge of traditional cryptographic tools.
Books
Boaz Barak: An Intensive Introduction to Cryptography (online) Dan Boneh and Victor Shoup: A Graduate Course in Applied Cryptography (online) Slides and other resources that the lecturer will make timely available to the students.
Frequency
Attendance is not mandatory but strongly recommended.
Exam mode
Specific questions will require answers spanning over a large part of the program of the course. The final evaluation will take into account the quality of each answer and the overall view inferred by them. The student is expected to be evaluated through just one written exam, while an oral exam will be used only in exceptional cases.
Lesson mode
Lectures will consist of illustrating the contents of slides and of a whiteboard (and/or a graphics tablet) with interaction and practical examples.
IVAN VISCONTI Lecturers' profile

Program - Frequency - Exams

Course program
Introduction on Modern Cryptography, Zero-Knowledge Proofs and Multi-Party Computation Recap on Modern cryptography Gentle introduction to Zero-Knowledge and Multi-Party Computation Practical use of libraries for snarks Practical use of libraries for MPC Advanced Cryptography for Blockchains Applications of snarks for Verifiable computation Zcash/TornadoCash/Redactable blockchain/Disinformation: Verifiable Random Functions, Verifiable Delay Functions, TimeLock Puzzles Key storage Random beacon Concrete examples through programming/libraries Advanced Signatures Unique and aggregatable Signatures Blind Signatures Ring/Group Signatures Threshold Signatures Post-Quantum Cryptography Shor and Grover algorithms, the state of affairs with SHA256/AES/RSA/Dlog Lattice assumptions and schemes from lattices Minicrypt constructions Hybrid solutions and concrete examples (programming/libraries) Cryptographic Protocols E-voting with HE, BS, Shuffles E-Auctions, E-Cash Credential systems and EU Digital Identity Wallet Concrete examples through programming/libraries Cryptographic Hardware PUFs and Smart Cards/CIE Intel SGX (and related TEE technologies) Privacy and Surveillance - Contact tracing/CSAM - E2E encryption and secure messaging - Brief overview on other tools
Prerequisites
Knowledge of traditional cryptographic tools.
Books
Boaz Barak: An Intensive Introduction to Cryptography (online) Dan Boneh and Victor Shoup: A Graduate Course in Applied Cryptography (online) Slides and other resources that the lecturer will make timely available to the students.
Frequency
Attendance is not mandatory but strongly recommended.
Exam mode
Specific questions will require answers spanning over a large part of the program of the course. The final evaluation will take into account the quality of each answer and the overall view inferred by them. The student is expected to be evaluated through just one written exam, while an oral exam will be used only in exceptional cases.
Lesson mode
Lectures will consist of illustrating the contents of slides and of a whiteboard (and/or a graphics tablet) with interaction and practical examples.
  • Lesson code10616549
  • Academic year2025/2026
  • CourseCybersecurity
  • CurriculumSingle curriculum
  • Year1st year
  • Semester2nd semester
  • SSDINF/01
  • CFU6