Grover meets Simon -- quantumly attacking the FX-construction

From MaRDI portal
Publication:1703920

DOI10.1007/978-3-319-70697-9_6zbMath1380.94109OpenAlexW2768897317MaRDI QIDQ1703920

Alexander May, Gregor Leander

Publication date: 8 March 2018

Full work available at URL: https://doi.org/10.1007/978-3-319-70697-9_6




Related Items (54)

Noisy Simon period findingOn Quantum Distinguishers for Type-3 Generalized Feistel Network Based on Separability(Quantum) cryptanalysis of misty schemesQuantum algorithms for the \(k\)-XOR problemHidden shift quantum cryptanalysis and implicationsTight bounds for Simon's algorithmTowards quantum large-scale password guessing on real-world distributionsQuantum cryptanalysis on contracting Feistel structures and observation on related-key settingsEvaluation of quantum cryptanalysis on SPECKBeyond quadratic speedups in quantum attacks on symmetric schemesEfficient quantum algorithms related to autocorrelation spectrumQuantum attacks against type-1 generalized Feistel ciphers and applications to CAST-256Quantum attacks on some Feistel block ciphersQuantum security analysis of RoccaQuantum meet-in-the-middle attack on Feistel constructionBreaking symmetric cryptosystems using the offline distributed Grover-Meets-Simon algorithmQuantum key recovery attacks on tweakable Even-Mansour ciphersQuantum attacks on generalized Feistel networks based on the strong-weak separabilityQuantum circuit implementation and resource analysis of LBlock and LiCiComplete analysis of Simon's quantum algorithm with additional collisionsTriangulating rebound attack on AES-like hashingAllocating rotational cryptanalysis-based preimage attack on 4-round \textsc{Keccak}-224 for quantum settingGrover on \(SIMON\)Post-quantum security on the Lai-Massey schemeQuantum cryptanalysis of Farfalle and (generalised) key-alternating Feistel networksA quantum distinguisher for 7/8-round SMS4 block cipherQuantum key-recovery attack on Feistel constructions: Bernstein-Vazirani meet Grover algorithmQuantum attacks against BBB secure PRFs or MACs built from public random permutationsQuantum reversible circuits for \(\mathrm{GF}(2^8)\) multiplication based on composite field arithmetic operationsQuantum linearization attacksQuantum resource estimation for FSR based symmetric ciphers and related Grover's attacksApplications of Simon's algorithm in quantum attacks on Feistel variantsSimon's algorithm and symmetric crypto: generalizations and automatized applicationsQuantum attacks on Lai-Massey structureOn quantum ciphertext indistinguishability, recoverability, and OAEPQuantum attacks on beyond-birthday-bound MACsQuantum attacks on PRFs based on public random permutationsRelated-key differential cryptanalysis of GMiMC used in post-quantum signaturesQuantum dimensionality reduction by linear discriminant analysisQuantum search for scaled hash function preimagesQuantum forgery attacks on COPA, AES-COPA and marble authenticated encryption algorithmsQuantum collision attacks on AES-like hashing with low quantum random access memoriesQuantum all-subkeys-recovery attacks on 6-round Feistel-\(2^\ast\) structure based on multi-equations quantum claw findingQuantum key-length extensionQuantum attacks on sum of Even-Mansour pseudorandom functionsBreaking LWC candidates: sESTATE and Elephant in quantum settingQuantum algorithms for learning Walsh spectra of multi-output Boolean functionsQuantum cryptographic property testing of multi-output Boolean functionsQuantum generic attacks on key-alternating Feistel ciphers for shorter keysA new post-quantum voting protocol based on physical lawsQuantum zero correlation linear cryptanalysisImproved BV-based quantum attack on block ciphersAttacks on beyond-birthday-bound MACs in the quantum settingQuantum Demiric-Selcuk meet-in-the-middle attacks on reduced-round AES




This page was built for publication: Grover meets Simon -- quantumly attacking the FX-construction