Public View

You are viewing the public version of the syllabus. If you have a SUNet account, you can view the richer version of the syllabus after logging in.

MATH 584
Mathematical Introduction to Quantum Algorithms and Post-Quantum Cryptography

Faculty Faculty of Engineering and Natural Sciences
Semester Fall 2025-2026
Course MATH 584 - Mathematical Introduction to Quantum Algorithms and Post-Quantum Cryptography
Time/Place
Time
Week Day
Place
Date
11:40-13:30
Mon
FENS-2019
Sep 29, 2025-Jan 3, 2026
08:40-09:30
Tue
FENS-G029
Sep 29, 2025-Jan 3, 2026
Level of course Masters
Course Credits SU Credit:3, ECTS:10
Prerequisites -
Corequisites -
Course Type Lecture

Instructor(s) Information

Ferruh Özbudak

Course Information

Catalog Course Description
This course provides a rigorous mathematical introduction to quantum algorithms and post-quantum cryptography, focusing on theoretical foundations rather than physical realizations. It covers Hilbert spaces, unitary transformations, quantum gates, and computational complexity theory. The course emphasizes algorithmic aspects, including Deutsch’s algorithm, Simon’s algorithm, Grover’s search, and Shor’s factorization algorithm, with a strong algebraic and complexity-theoretic approach. The final four weeks introduce post-quantum cryptography from a mathematical perspective, covering code-based and lattice-based cryptographic techniques that ensure security in a quantum computing era. Graduate students will engage with additional research-based assignments and theoretical proofs.
Course Learning Outcomes:
1. Understand the mathematical foundations of quantum computing, including Hilbert spaces, unitary quantum circuits.
2. Analyze and apply quantum algorithms, such as Deutsch?s algorithm, Grover?s search, Simon?s algorithm, and Shor?s factorization method, from an algebraic and complexity theoretic perspective
3. Develop mathematical reasoning for quantum cryptography, including the security implications of quantum computing on classical cryptographic protocols
4. Explore post-quantum cryptographic schemes, particularly code-based and lattice based cryptography, and evaluate their mathematical structures assumptions.
5. Compare and contrast quantum computing with classical complexity computing, focusing on classes, computational advantages, and cryptographic impact.
6. Apply theoretical knowledge to solve research-oriented problems in quantum computing and post-quantum cryptography, particularly through project-based learning.
Course Objective
-

Course Materials

Resources:
Technology Requirements:

Policies