Grover meets Simon -- quantumly attacking the FX-construction
From MaRDI portal
Publication:1703920
DOI10.1007/978-3-319-70697-9_6zbMath1380.94109OpenAlexW2768897317MaRDI QIDQ1703920
Publication date: 8 March 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-70697-9_6
Related Items (54)
Noisy Simon period finding ⋮ On Quantum Distinguishers for Type-3 Generalized Feistel Network Based on Separability ⋮ (Quantum) cryptanalysis of misty schemes ⋮ Quantum algorithms for the \(k\)-XOR problem ⋮ Hidden shift quantum cryptanalysis and implications ⋮ Tight bounds for Simon's algorithm ⋮ Towards quantum large-scale password guessing on real-world distributions ⋮ Quantum cryptanalysis on contracting Feistel structures and observation on related-key settings ⋮ Evaluation of quantum cryptanalysis on SPECK ⋮ Beyond quadratic speedups in quantum attacks on symmetric schemes ⋮ Efficient quantum algorithms related to autocorrelation spectrum ⋮ Quantum attacks against type-1 generalized Feistel ciphers and applications to CAST-256 ⋮ Quantum attacks on some Feistel block ciphers ⋮ Quantum security analysis of Rocca ⋮ Quantum meet-in-the-middle attack on Feistel construction ⋮ Breaking symmetric cryptosystems using the offline distributed Grover-Meets-Simon algorithm ⋮ Quantum key recovery attacks on tweakable Even-Mansour ciphers ⋮ Quantum attacks on generalized Feistel networks based on the strong-weak separability ⋮ Quantum circuit implementation and resource analysis of LBlock and LiCi ⋮ Complete analysis of Simon's quantum algorithm with additional collisions ⋮ Triangulating rebound attack on AES-like hashing ⋮ Allocating rotational cryptanalysis-based preimage attack on 4-round \textsc{Keccak}-224 for quantum setting ⋮ Grover on \(SIMON\) ⋮ Post-quantum security on the Lai-Massey scheme ⋮ Quantum cryptanalysis of Farfalle and (generalised) key-alternating Feistel networks ⋮ A quantum distinguisher for 7/8-round SMS4 block cipher ⋮ Quantum key-recovery attack on Feistel constructions: Bernstein-Vazirani meet Grover algorithm ⋮ Quantum attacks against BBB secure PRFs or MACs built from public random permutations ⋮ Quantum reversible circuits for \(\mathrm{GF}(2^8)\) multiplication based on composite field arithmetic operations ⋮ Quantum linearization attacks ⋮ Quantum resource estimation for FSR based symmetric ciphers and related Grover's attacks ⋮ Applications of Simon's algorithm in quantum attacks on Feistel variants ⋮ Simon's algorithm and symmetric crypto: generalizations and automatized applications ⋮ Quantum attacks on Lai-Massey structure ⋮ On quantum ciphertext indistinguishability, recoverability, and OAEP ⋮ Quantum attacks on beyond-birthday-bound MACs ⋮ Quantum attacks on PRFs based on public random permutations ⋮ Related-key differential cryptanalysis of GMiMC used in post-quantum signatures ⋮ Quantum dimensionality reduction by linear discriminant analysis ⋮ Quantum search for scaled hash function preimages ⋮ Quantum forgery attacks on COPA, AES-COPA and marble authenticated encryption algorithms ⋮ Quantum collision attacks on AES-like hashing with low quantum random access memories ⋮ Quantum all-subkeys-recovery attacks on 6-round Feistel-\(2^\ast\) structure based on multi-equations quantum claw finding ⋮ Quantum key-length extension ⋮ Quantum attacks on sum of Even-Mansour pseudorandom functions ⋮ Breaking LWC candidates: sESTATE and Elephant in quantum setting ⋮ Quantum algorithms for learning Walsh spectra of multi-output Boolean functions ⋮ Quantum cryptographic property testing of multi-output Boolean functions ⋮ Quantum generic attacks on key-alternating Feistel ciphers for shorter keys ⋮ A new post-quantum voting protocol based on physical laws ⋮ Quantum zero correlation linear cryptanalysis ⋮ Improved BV-based quantum attack on block ciphers ⋮ Attacks on beyond-birthday-bound MACs in the quantum setting ⋮ Quantum Demiric-Selcuk meet-in-the-middle attacks on reduced-round AES
This page was built for publication: Grover meets Simon -- quantumly attacking the FX-construction