Teaching
Fundamentals of cryptography (Spring 2025)
Lattices (Fall 2024)
Fundamentals of cryptography (Spring 2024)
Lattices (Fall 2023)
Fundamentals of cryptography (Spring 2023)
Lattices (Fall 2022)
Fundamentals of cryptography (Spring 2022)
Fundamentals of cryptography (Spring 2021)
Fundamentals of cryptography (Spring 2025)
Lattices (Fall 2024)
Fundamentals of cryptography (Spring 2024)
Lattices (Fall 2023)
Fundamentals of cryptography (Spring 2023)
Lattices (Fall 2022)
Fundamentals of cryptography (Spring 2022)
Fundamentals of cryptography (Spring 2021)
Ph.D. Students
毕梦达 Mengda Bi
李文杰 Wenjie Li
骆晗 Han Luo
季利恒 Liheng Ji
毕梦达 Mengda Bi
李文杰 Wenjie Li
骆晗 Han Luo
季利恒 Liheng Ji
Master Students
韩新淼 Xinmiao Han
韩新淼 Xinmiao Han
Program Committee
Crypto 2025, 2024, 2023
Theory of Cryptography Conference (TCC) 2024, 2022, 2021
Asiacrypt 2023, 2022, 2020, 2019
Eurocrypt 2020
Workshop on Encrypted Computing & Applied Homomorphic Cryptography (WAHC) 2023, 2022, 2021, 2020, 2019
Public Key Cryptography (PKC) 2024, 2018
IACR Communications in Cryptology 2024
Crypto 2025, 2024, 2023
Theory of Cryptography Conference (TCC) 2024, 2022, 2021
Asiacrypt 2023, 2022, 2020, 2019
Eurocrypt 2020
Workshop on Encrypted Computing & Applied Homomorphic Cryptography (WAHC) 2023, 2022, 2021, 2020, 2019
Public Key Cryptography (PKC) 2024, 2018
IACR Communications in Cryptology 2024
Websites/Lecture notes
Damien Stehle on Lattices [ site ]
Oded Regev Lattice Fall 2004 [ site ]
Scott Aaronson: quantum states from quantum money to blackholes [ pdf ]
Sanjeev Arora: A Theorist's toolkit [ site ]
Damien Stehle on Lattices [ site ]
Oded Regev Lattice Fall 2004 [ site ]
Scott Aaronson: quantum states from quantum money to blackholes [ pdf ]
Sanjeev Arora: A Theorist's toolkit [ site ]
Surveys
Iterative decoding of low-density parity check codes [ pdf ]
Isogeny volcanoes [ pdf ]
Computational problems in supersingular elliptic curve isogenies [ pdf ]
Quantum linear systems algorithms: a primer [ pdf ]
Pseudorandom functions: three decades later [ pdf ]
Computing rational points on curves [ pdf ]
Another look at generic groups [ pdf ]
A pragmatic introduction to secure multi-party computation [ pdf ]
Unique game conjecture [ pdf ]
The Riemann Hypothesis [ pdf, slides ]
Iterative decoding of low-density parity check codes [ pdf ]
Isogeny volcanoes [ pdf ]
Computational problems in supersingular elliptic curve isogenies [ pdf ]
Quantum linear systems algorithms: a primer [ pdf ]
Pseudorandom functions: three decades later [ pdf ]
Computing rational points on curves [ pdf ]
Another look at generic groups [ pdf ]
A pragmatic introduction to secure multi-party computation [ pdf ]
Unique game conjecture [ pdf ]
The Riemann Hypothesis [ pdf, slides ]
Talks related to cryptography
Elliptic curves, cryptography, and computation [ 2010 ECC workshop, link, pdf ]
Quantum computing and limits of the efficiently computable [ 2011 CMU Buhl lecture, link ]
Quantum computing, a great science in the making [ 2012 @Brown University, link ]
A history of the development of NTRU [ 2014 @Eurocrypt, link ]
Pairing in cryptography [ 2015 Simons crypto summer program lecture, link ]
Sphere packing, lattice packing, and related problems [ ICERM lattice, link ]
Algorand, the public ledger [ Avi60, link ] warning: 42:25, this is capitalism, not democracy; this is not good :(
Elliptic curves, cryptography, and computation [ 2010 ECC workshop, link, pdf ]
Quantum computing and limits of the efficiently computable [ 2011 CMU Buhl lecture, link ]
Quantum computing, a great science in the making [ 2012 @Brown University, link ]
A history of the development of NTRU [ 2014 @Eurocrypt, link ]
Pairing in cryptography [ 2015 Simons crypto summer program lecture, link ]
Sphere packing, lattice packing, and related problems [ ICERM lattice, link ]
Algorand, the public ledger [ Avi60, link ] warning: 42:25, this is capitalism, not democracy; this is not good :(
Courses taken
6.876J Lattices (Fall 2015, link)
MA 779 Probability (Fall 2014)
CS 655 Networking (Fall 2013, link)
CS 537 Randomness (Fall 2013, link)
6.892 Computing on Encrypted Data (Fall 2013, link)
CS 512 Formal Method (Spring 2013, link)
CS 558 Network Security (Spring 2013)
8197 Analysis of Boolean Functions (Spring 2013, link)
CS 530 Complexity (Fall 2012)
CS 538 Cryptography (Fall 2012)
6.s898 The Evolution of a Proof (Fall 2012, link)
6.876J Lattices (Fall 2015, link)
MA 779 Probability (Fall 2014)
CS 655 Networking (Fall 2013, link)
CS 537 Randomness (Fall 2013, link)
6.892 Computing on Encrypted Data (Fall 2013, link)
CS 512 Formal Method (Spring 2013, link)
CS 558 Network Security (Spring 2013)
8197 Analysis of Boolean Functions (Spring 2013, link)
CS 530 Complexity (Fall 2012)
CS 538 Cryptography (Fall 2012)
6.s898 The Evolution of a Proof (Fall 2012, link)
Best movies watched in the cinema
La double vie de Véronique
Amadeus
花样年华 (In the mood of love)
东邪西毒 (Ashes of time)
Андрей Рублёв
Trois couleurs: Bleu
Paris, Texas
Alice in the cities
Cléo de 5 à 7
Before sunrise
Before sunset
Before midnight
Close-up
Dead poets society
Dog day afternoon
Pociąg (Night train)
Through the olive trees
Persona
Seven samurai
爱情神话
Le bonheur
...
8 1/2 (get lost at some point)
La Dolce Vita (fall asleep for 30 mins)
La double vie de Véronique
Amadeus
花样年华 (In the mood of love)
东邪西毒 (Ashes of time)
Андрей Рублёв
Trois couleurs: Bleu
Paris, Texas
Alice in the cities
Cléo de 5 à 7
Before sunrise
Before sunset
Before midnight
Close-up
Dead poets society
Dog day afternoon
Pociąg (Night train)
Through the olive trees
Persona
Seven samurai
爱情神话
Le bonheur
...
8 1/2 (get lost at some point)
La Dolce Vita (fall asleep for 30 mins)