Applied
Cryptography.
A university course bridging modern cryptographic theory with the systems that ship it. Provable security, TLS 1.3, secure messaging, end-to-end encrypted storage, post-quantum primitives, zero-knowledge proofs, multi-party computation, and homomorphic encryption — with hands-on projects in Go and Rust. Summer 2026 session offers 50 tuition-free spots for students at Lebanese universities.
Syllabus.
Introduction
Course scope, recurring themes, theory vs. practice, evolution of cryptography.
The provable security mindset
Perfect secrecy via the One-Time Pad, Kerckhoff's principle, why obscurity fails.
Computational cryptography
Reduction proofs, adversarial models, indistinguishability, birthday probabilities.
Pseudorandomness
PRGs, PRFs, PRPs/block ciphers, GGM, Feistel networks, the PRF–PRP switching lemma.
CPA & CCA attacks
CBC and CTR modes vs. ECB, malleability, CCA security, format-oracle attacks.
Hash functions
Collision/preimage resistance, birthday paradox, MD5→SHA-3/BLAKE3, password hashing.
Hard problems & Diffie–Hellman
Discrete log, CDH, DDH assumptions, real-world implementation pitfalls.
Elliptic curves & signatures
ECDLP, ECDH, ECDSA, EdDSA/Ed25519, NIST vs. Curve25519, invalid curve attacks.
Transport Layer Security
TLS 1.3 handshake, PKI, FREAK, Logjam, Heartbleed, modern deployment.
The story of RC4
RC4's lifecycle from 1987 to broken: WEP, SSL/TLS, FMS attack, Bar Mitzvah.
Secure messaging
PGP, OTR, SIGMA, Signal X3DH + double ratchet, MLS, post-compromise security.
End-to-end encrypted cloud storage
MEGA, Nextcloud failures, WhatsApp backups, HSMs, OPAQUE, formal E2EE protocols.
High-assurance cryptography
ProVerif, CryptoVerif, F*, hax — and the verification facade in practice.
Post-quantum cryptography
Shor's and Grover's algorithms, Learning With Errors, ML-KEM, ML-DSA.
Cryptocurrency cryptography
Bitcoin proof-of-work, UTXO, Ethereum smart contracts, L2 (state channels, rollups).
Zero-knowledge proofs
Completeness/soundness, Schnorr, Sigma, Fiat–Shamir, circuits, Zcash, age verification.
Secure multi-party computation
Yao's garbled circuits, secret sharing, oblivious transfer, SCALE-MAMBA, MP-SPDZ.
Fully homomorphic encryption
Gentry's breakthrough, BGV, BFV, CKKS, TFHE, privacy-preserving computation.
Summer school for applied cryptographers.
UNTIL JULY 13
The conference
Want to bring this course to your university?
All materials are open and reusable. Talk to us about adapting the course for your students, hosting a regional cohort, or sponsoring tuition for under-represented learners.
Get in touch →