CS 517 Advanced Cryptography & Data Security

Spring 2018
Computer Science
Sabanci University



  • N. P. Smart, Cryptogrphy Made Simple. First Edition, Springer, 2016, ISBN 978-3-319-21936-3.

Recommended resources

  • W. Trappe and Lawrence C. Washington, Introduction to Cryptography with Coding Theory. Second Edition, Prentice Hall, 2005, ISBN 13- 978-0131862395
  • D. R. Stinson, Cryptography, Theory and Practice, 3rd Edition, Chapman & Hall/CRC, 2006. ISBN: 1-58488-508-4.
  • W. Mao, Modern Cryptography: Theory and Practice. Prentice Hall, 2004.
  • A.J. Menezes, P. C. van Oorschot and S. A. Vanstone. Handbook of Applied Cryptography, CRC Press, 1997. ISBN: 0-8493-8523-7. Most of the chapters of this book are available online free of charge.

Time & Place

  • Monday   10:40-12:30 – FASS G043 (Lecture)
  • Tuesday  13:40-14:30 – FENS L048 (Lecture)


This is a three-credit course on the advanced methods, algorithms, techniques, and tools of data security and cryptography.


  • Theoretical aspects of cryptography : Probabilistic nature of cryptographic systems, entropy, unconditional security, computational security, modern cryptography basics.
  • Mathematical foundations: Complexity theory, number theory, finite fields, isomorphism, cyclotomic polynomials, ring of polynomials, number theoretic transformation
  • Elliptic curve cryptosystems : Elliptic curve group, elliptic curve point operations, elliptic curve key exchange, elliptic curve digital signature, pairing-based cryptography
  • Homomorphic encrptions scehemes: Homomorphic property, Paillier cryptosystem, Damgard-Jurick cryptosystem, lattice-based cryptography
  • Oblivious transfer: 1-out-of-2 OT, 1-out-of-N OT, secure product, private information retrieval.
  • Cryptographic protocol theory: Zero-knowledge, sigma-protocol
  • Secure multiparty computations: secure two-party computation, Yao’s garbled circuit, secure function evaluation
  • Electronic elections: e-voting principles, algorithms and implementation
  • Side-Channel and fault attacks: Side-channel attack principles, cache-based side attacks, fault attacks, countermeasures

Homework Assignments

Handwritten assignments are not acceptable

Tentative grading

  • Midterms: 25 %
  • Final: 35 %
  • HW Assignments: 15 %
  • Project: 25 %

Important Dates

  • First midterm: TBA 
  • Final: As scheduled by registrar


This class is open to graduate students.

Undergraduate students need instructor’s approval.

Dr. Erkay Savas