Sergey Nikolenko

Sergey Nikolenko

Main page

Books
Research papers
Talks and posters
Students
Popular science
Other stuff

   Research
CS and crypto
Bioinformatics
Machine learning
Algebraic geometry
Algebra
Bayesian networks
Earth sciences

   Teaching
 2014
ML, KFU
Game Theory, HSE
Mech. Design, HSE
ML, CSClub Kazan
Game theory, HSE
Math. logic, AU
Machine learning, STC
Machine learning, AU
 2013
Discrete math, HSE
Machine learning, STC
Math. logic, AU
Cryptography, AU
 2012
Machine learning, STC
Math. logic, AU
Machine learning II, AU
Machine learning, AU
Machine learning, EMC
 2011
Cryptography, AU
Math. logic, AU
Machine learning, AU
 2010
Math. logic, AU
Machine learning, AU
Cryptography, AU
 2009
Crypto in CS Club
Statistics
Machine learning, AU
Cryptography
 2008
Speech recognition
MD for CS Club
ML for CS Club
Mechanism design
 2007
Machine Learning
Probabilistic learning

  External links
Google Scholar profile
DBLP profile
LiveJournal account
userinfonikolenko (in Russian)

Teaching activities

Cryptography

This course is presented in the «Academic University of Physics and Technology» as part of the recently established Chair of Mathematics and Computer Science.

The course itself (all lecture notes are in Russian):

1. Introduction. The subject of cryptography. Secret-key cryptography.
2. Block cipher modes of operation. Public-key cryptography. Cryptographic primitives. Factoring and discrete logarithm. RSA, Diffie-Hellman, ElGamal. RSA and ElGamal signature schemes.
Lecture notes by Catherine Tuzova (.pdf, 276kb)
3. Elliptic curves: definitions, irreducible components, singular and nonsingular points. Estimating the number of points over a finite field. Hasse theorem.
4. Resultants. Basic properties. Intersection numbers. Existence and uniqueness of intersection numbers.
5. Bezout theorem. Addition on an elliptic curve. The group law: associativity.
6. Weierstrass equation, canonical equations for different characteristics, coordinate formulas for the group law. Jacobi coordinates and their advantages. The discrete log problem on an elliptic curve.
7. Factoring. Fermat's method, Kraitchik's method. Quadratic sieve. Polynomial sieve.
8. The discrete log problem. The Pohlig-Hellman attack. The Pollard's rho attack. Idea of the index calculus method.
9. The index calculus method in details. Complexity of the index calculus attack.
10. Secret sharing. Blackley and Shamir. Verifiable secret sharing. Proactive secret sharing.
11. Interactive proof systems. Completeness and correctness. Sample IPS for Graph-ISO and Graph-NISO.
12. The zero knowledge property. Simulating the view. ZK definitions. A ZK protocol for Graph-ISO. A not quite ZK protocol for Graph-NISO.
13. Zero knowledge definitions: black box vs. code access. ZK with advice. A correct ZK protocol for Graph-NISO.
14. Oblivious transfer: Rabin's OT, 1-2-OT scheme. Secure multi-party computation. Bit commitment. Coin flip in the well. Probabilistic secure multi-party computation (poker over the phone).