Hidden shift quantum cryptanalysis and implications
From MaRDI portal
Publication:1633473
DOI10.1007/978-3-030-03326-2_19zbMath1446.94106OpenAlexW2811104474MaRDI QIDQ1633473
María Naya-Plasencia, Xavier Bonnetain
Publication date: 20 December 2018
Full work available at URL: https://hal.inria.fr/hal-01953914/file/2018-432.pdf
symmetric cryptographyquantum cryptanalysishidden shift problemmodular additionsPoly1305Simon-meets-Kuperberg
Related Items (15)
Noisy Simon period finding ⋮ On Quantum Distinguishers for Type-3 Generalized Feistel Network Based on Separability ⋮ Свойства регулярных представлений неабелевых $2$-групп с циклической подгруппой индекса $2$ ⋮ Post-quantum security of the Even-Mansour cipher ⋮ Breaking symmetric cryptosystems using the offline distributed Grover-Meets-Simon algorithm ⋮ A quantum distinguisher for 7/8-round SMS4 block cipher ⋮ Quantum algorithm based on the \(\varepsilon\)-random linear disequations for the continuous hidden shift problem ⋮ Quantum linearization attacks ⋮ QCB: efficient quantum-secure authenticated encryption ⋮ Two remarks on the vectorization problem ⋮ Zero sum subsequences and hidden subgroups ⋮ Improved classical and quantum algorithms for subset-sum ⋮ Leveraging the hardness of dihedral coset problem for quantum cryptography ⋮ A fusion algorithm for solving the hidden shift problem in finite abelian groups ⋮ Quantum security analysis of CSIDH
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A note on quantum related-key attacks
- Quantum security of NMAC and related constructions. PRF domain extension against quantum attacks
- Advances in cryptology -- ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3--7, 2017. Proceedings. Part III
- Grover meets Simon -- quantumly attacking the FX-construction
- Breaking Symmetric Cryptosystems Using Quantum Period Finding
- Confidentiality and Integrity: A Constructive Perspective
- Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation
- How to Securely Release Unverified Plaintext in Authenticated Encryption
- On Symmetric Encryption with Distinguishable Decryption Failures
- Robust Authenticated-Encryption AEZ and the Problem That It Solves
- Non-Interactive Zero-Knowledge Proofs in the Quantum Random Oracle Model
- Another Subexponential-time Quantum Algorithm for the Dihedral Hidden Subgroup Problem
- How to Protect DES Against Exhaustive Key Search
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- Data Is a Stream: Security of Stream-Based Channels
- Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance
- Rogue Decryption Failures: Reconciling AE Robustness Notions
- Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR
- A Provable-Security Treatment of the Key-Wrap Problem
- Reinventing the travois: Encryption/MAC in 30 ROM bytes
- Advances in Cryptology - CRYPTO 2003
- A Subexponential-Time Quantum Algorithm for the Dihedral Hidden Subgroup Problem
- Fast Software Encryption
This page was built for publication: Hidden shift quantum cryptanalysis and implications