Attacks on beyond-birthday-bound MACs in the quantum setting
From MaRDI portal
Publication:2118560
DOI10.1007/978-3-030-81293-5_22zbMath1485.94090OpenAlexW3181006038MaRDI QIDQ2118560
Lei Hu, Dingfeng Ye, Peng Wang, Ting-Ting Guo
Publication date: 22 March 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-81293-5_22
Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items
Quantum key recovery attacks on tweakable Even-Mansour ciphers, Quantum attacks against BBB secure PRFs or MACs built from public random permutations, Quantum linearization attacks, Simon's algorithm and symmetric crypto: generalizations and automatized applications, Quantum attacks on Lai-Massey structure, Quantum attacks on beyond-birthday-bound MACs, Quantum attacks on PRFs based on public random permutations
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Quantum algorithms for the \(k\)-XOR problem
- Generic attacks against beyond-birthday-bound MACs
- Blockcipher-based MACs: beyond the birthday bound without message length
- Grover meets Simon -- quantumly attacking the FX-construction
- Tight security bounds for double-block hash-then-sum MACs
- Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound
- Optimal merging in quantum \(k\)-xor and \(k\)-sum algorithms
- How to build optimally secure PRFs using block ciphers
- Quantum collision attacks on AES-like hashing with low quantum random access memories
- Breaking Symmetric Cryptosystems Using Quantum Period Finding
- Adversary lower bound for the k-sum problem
- How to Protect DES Against Exhaustive Key Search
- Full PRF-Secure Message Authentication Code Based on Tweakable Block Cipher
- On the Power of Quantum Computation
- 3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound
- Quantum-Secure Message Authentication Codes
- On Quantum Distinguishers for Type-3 Generalized Feistel Network Based on Separability
- The Sum of CBC MACs Is a Secure PRF
- A New Variant of PMAC: Beyond the Birthday Bound
- Progress in Cryptology - INDOCRYPT 2004
- Information Security and Cryptology
- How to protect DES against exhaustive key search (an analysis of DESX).