Mathematical Introduction to Quantum Algorithms and Post-Quantum Cryptography
MATH 484

Unpublished Syllabus
This syllabus is not published yet. Only you can view it.
Faculty: Faculty of Engineering and Natural Sciences
Semester: Fall 2025-2026
Course: Mathematical Introduction to Quantum Algorithms and Post-Quantum Cryptography - MATH 484
Classroom: FENS-G029,FENS-L035
Level of course: Undergraduate
Course Credits: SU Credit:3.000, ECTS:6, Basic:3, Engineering:3
Prerequisites: MATH 201
Corequisites: -
Course Type: Lecture

Instructor(s) Information

Ferruh Özbudak

Course Information

Catalog Course Description
This course provides a rigorous mathematical introduction to quantum algorithms and post-quantum cryptography, focusing on theoretical foundations rather than physical realizations. It covers Hilbert spaces, unitary transformations, quantum gates, and computational complexity theory. The course emphasizes algorithmic aspects, including Deutsch’s algorithm, Simon’s algorithm, Grover’s search, and Shor’s factorization algorithm, with a strong algebraic and complexity-theoretic approach. The final four weeks introduce post-quantum cryptography from a mathematical perspective, covering code-based and lattice-based cryptographic techniques that ensure security in a quantum computing era.
Course Learning Outcomes:
1. Understand the mathematical foundations of quantum computing, including Hilbert spaces, unitary transformations, and quantum circuits.
2. Analyze and apply quantum algorithms, such as Deutsch?s algorithm, Grover?s search, Simon?s algorithm, and Shor?s factorization method, from an algebraic and complexity-theoretic perspective.
3. Develop mathematical reasoning for quantum cryptography, including the security implications of quantum computing on classical cryptographic protocols.
4. Explore post-quantum cryptographic schemes, particularly code-based and lattice-based cryptography, and evaluate their mathematical structures and security assumptions.
5. Compare and contrast quantum computing with classical computing, focusing on complexity classes, computational advantages, and cryptographic impact.
6. Apply theoretical knowledge to solve research-oriented problems in quantum computing and post-quantum cryptography, particularly through project-based learning.
Course Objective
-

Course Materials

Resources:
-
Technology Requirements:
-