Pages that link to "Item:Q2829216"
From MaRDI portal
The following pages link to Breaking Symmetric Cryptosystems Using Quantum Period Finding (Q2829216):
Displaying 50 items.
- Noisy Simon period finding (Q826245) (← links)
- Quantum algorithms for the \(k\)-XOR problem (Q1633472) (← links)
- Hidden shift quantum cryptanalysis and implications (Q1633473) (← links)
- Quantum reversible circuit of AES-128 (Q1654144) (← links)
- Quantum algorithm design: techniques and applications (Q1730317) (← links)
- Quantum key-recovery on full AEZ (Q1746983) (← links)
- Quantum key search with side channel advice (Q1746986) (← links)
- Breaking LWC candidates: sESTATE and Elephant in quantum setting (Q2035448) (← links)
- Breaking tweakable enciphering schemes using Simon's algorithm (Q2043415) (← links)
- Query complexity of generalized Simon's problem (Q2051810) (← links)
- Quantum-access-secure message authentication via blind-unforgeability (Q2055681) (← links)
- Quantum algorithms for learning Walsh spectra of multi-output Boolean functions (Q2100831) (← links)
- Quantum cryptographic property testing of multi-output Boolean functions (Q2100834) (← links)
- Quantum generic attacks on key-alternating Feistel ciphers for shorter keys (Q2101200) (← links)
- A new post-quantum voting protocol based on physical laws (Q2101594) (← links)
- Quantum zero correlation linear cryptanalysis (Q2101600) (← links)
- A cluster-based networking approach for large-scale and wide-area quantum key agreement (Q2107974) (← links)
- Improved BV-based quantum attack on block ciphers (Q2110996) (← links)
- Attacks on beyond-birthday-bound MACs in the quantum setting (Q2118560) (← links)
- Quantum indistinguishability for public key encryption (Q2118562) (← links)
- Quantum Demiric-Selcuk meet-in-the-middle attacks on reduced-round AES (Q2118720) (← links)
- Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound (Q2119014) (← links)
- On tight quantum security of HMAC and NMAC in the quantum random oracle model (Q2120095) (← links)
- Tight bounds for Simon's algorithm (Q2146068) (← links)
- Towards quantum large-scale password guessing on real-world distributions (Q2149836) (← links)
- Quantum cryptanalysis on contracting Feistel structures and observation on related-key settings (Q2152039) (← links)
- Evaluation of quantum cryptanalysis on SPECK (Q2152040) (← links)
- Pholkos -- efficient large-state tweakable block ciphers from the AES round function (Q2152178) (← links)
- Beyond quadratic speedups in quantum attacks on symmetric schemes (Q2170092) (← links)
- Post-quantum security of the Even-Mansour cipher (Q2170099) (← links)
- General linear group action on tensors: a candidate for post-quantum cryptography (Q2175914) (← links)
- Efficient quantum algorithms related to autocorrelation spectrum (Q2179405) (← links)
- Quantum attacks against type-1 generalized Feistel ciphers and applications to CAST-256 (Q2179408) (← links)
- Quantum attacks on some Feistel block ciphers (Q2182081) (← links)
- Quantum attacks on sum of Even-Mansour pseudorandom functions (Q2234803) (← links)
- Quantum spin half algebra and generalized Megrelishvili protocol for confidentiality of digital images (Q2239534) (← links)
- Efficient slide attacks (Q2413611) (← links)
- Using Bernstein-Vazirani algorithm to attack block ciphers (Q2414939) (← links)
- Block encryption of quantum messages (Q2677269) (← links)
- Complete analysis of Simon's quantum algorithm with additional collisions (Q2681014) (← links)
- A quantum related-key attack based on the Bernstein-Vazirani algorithm (Q2681588) (← links)
- Grover on \(SIMON\) (Q2681716) (← links)
- Quantum algorithms for the Goldreich-Levin learning problem (Q2684273) (← links)
- A quantum distinguisher for 7/8-round SMS4 block cipher (Q2684290) (← links)
- Quantum key-recovery attack on Feistel constructions: Bernstein-Vazirani meet Grover algorithm (Q2685637) (← links)
- Quantum attacks against BBB secure PRFs or MACs built from public random permutations (Q2686166) (← links)
- Applications of Simon's algorithm in quantum attacks on Feistel variants (Q2687219) (← links)
- Quantum search for scaled hash function preimages (Q2690252) (← links)
- Quantum forgery attacks on COPA, AES-COPA and marble authenticated encryption algorithms (Q2690280) (← links)
- Quantum collision attacks on AES-like hashing with low quantum random access memories (Q2692403) (← links)