Post-quantum security of the Even-Mansour cipher
From MaRDI portal
Publication:2170099
DOI10.1007/978-3-031-07082-2_17zbMath1502.81020arXiv2112.07530OpenAlexW4285213541MaRDI QIDQ2170099
Publication date: 30 August 2022
Full work available at URL: https://arxiv.org/abs/2112.07530
Permutations, words, matrices (05A05) Quantum computation (81P68) Cryptography (94A60) Derivative securities (option pricing, hedging, etc.) (91G20) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items (3)
Quantum key recovery attacks on tweakable Even-Mansour ciphers ⋮ Adaptive versus static multi-oracle algorithms, and quantum security of a split-key PRF ⋮ Quantum linear key-recovery attacks using the QFT
Cites Work
- A construction of a cipher from a single pseudorandom permutation.
- Hidden shift quantum cryptanalysis and implications
- A concrete treatment of Fiat-Shamir signatures in the quantum random-oracle model
- A modular analysis of the Fujisaki-Okamoto transformation
- Measure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA security
- Quantum-access-secure message authentication via blind-unforgeability
- Tighter proofs of CCA security in the quantum random oracle model
- Quantum attacks without superposition queries: the offline Simon's algorithm
- Cryptanalysis against symmetric-key schemes with online classical queries and offline quantum computations
- How to record quantum queries, and applications to quantum indifferentiability
- Security of the Fiat-Shamir transformation in the quantum random-oracle model
- The quantum query complexity of the hidden subgroup problem is polynomial
- Post-quantum security of Fiat-Shamir
- Quantum key-length extension
- Breaking Symmetric Cryptosystems Using Quantum Period Finding
- Minimalism in Cryptography: The Even-Mansour Scheme Revisited
- Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
- Quantum Algorithms for Some Hidden Shift Problems
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- On the Power of Quantum Computation
- Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts
- Tight adaptive reprogramming in the QROM
This page was built for publication: Post-quantum security of the Even-Mansour cipher