CS 517 Advanced Cryptography & Data Security

Spring 2021
Computer Science
Sabanci University



  • N. P. Smart, Cryptography Made Simple. First Edition, Springer, 2016, ISBN: 978-3-319-21935-6, ISBN 978-3-319-21936-3 (e-book) .

Recommended resources

  • W. Trappe and Lawrence C. Washington, Introduction to Cryptography with Coding Theory. Second Edition, Prentice Hall, 2005, ISBN 13- 978-0131862395.
  • D. R. Stinson, Cryptography, Theory and Practice, 3rd Edition, Chapman & Hall/CRC, 2006. ISBN: 1-58488-508-4.
  • W. Mao, Modern Cryptography: Theory and Practice. Prentice Hall, 2004.
  • A.J. Menezes, P. C. van Oorschot and S. A. Vanstone. Handbook of Applied Cryptography, CRC Press, 1997. ISBN: 0-8493-8523-7. Most of the chapters of this book are available online free of charge.

Time & Place

  • Monday   16:40-17:30 (Lecture)
  • Friday   08:40-10:30 (Lecture)
  • Tuesday   09:40-11:30 (Office hour)


This is a three-credit course on the advanced methods, algorithms, techniques, and tools of data security and cryptography.


  • Theoretical aspects of cryptography : Probabilistic nature of cryptographic systems, entropy, unconditional security, computational security, modern cryptography basics.
  • Mathematical foundations: Complexity theory, number theory, finite fields, isomorphism, cyclotomic polynomials, ring of polynomials, number theoretic transformation
  • Homomorphic encrptions scehemes: Homomorphic property, Paillier cryptosystem, Damgard-Jurick cryptosystem, lattice-based cryptography
  • Oblivious transfer: 1-out-of-2 OT, 1-out-of-N OT, secure product, private information retrieval.
  • Commitment schemes: Hash-based commitment scheme, Pedersen commitment scheme.
  • Cryptographic protocol theory: Zero-knowledge, sigma-protocol
  • Secure multiparty computations: secure two-party computation, Yao’s garbled circuit, secure function evaluation
  • Electronic elections: e-voting principles, algorithms and implementation
  • Side-Channel and fault attacks: Side-channel attack principles, cache-based side attacks, fault attacks, countermeasures

Homework Assignments

Handwritten assignments are not acceptable

Tentative grading

  • Midterms: 25 %
  • Final: 30 %
  • Quiz: 10 %
  • HW Assignments: 15 %
  • Project: 20 %

Important Dates

  • Midterm: TBA 
  • Final: As scheduled by registrar


This class is open to graduate students.

Undergraduate students need instructor’s approval.

Dr. Erkay Savas