Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Quantum attacks without superposition queries: the offline Simon's algorithm - MaRDI portal

Quantum attacks without superposition queries: the offline Simon's algorithm

From MaRDI portal
Publication:2181896

DOI10.1007/978-3-030-34578-5_20zbMath1456.94052arXiv2002.12439OpenAlexW2991519650MaRDI QIDQ2181896

Xavier Bonnetain, Yu Sasaki, André Schrottenloher, María Naya-Plasencia, Akinori Hosoyamada

Publication date: 20 May 2020

Full work available at URL: https://arxiv.org/abs/2002.12439




Related Items (33)

Noisy Simon period findingOn Quantum Distinguishers for Type-3 Generalized Feistel Network Based on SeparabilityHash-Based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message SecurityTight bounds for Simon's algorithmQuantum cryptanalysis on contracting Feistel structures and observation on related-key settingsEvaluation of quantum cryptanalysis on SPECKBeyond quadratic speedups in quantum attacks on symmetric schemesPost-quantum security of the Even-Mansour cipherQuantum security analysis of RoccaBreaking symmetric cryptosystems using the offline distributed Grover-Meets-Simon algorithmTriangulating rebound attack on AES-like hashingAllocating rotational cryptanalysis-based preimage attack on 4-round \textsc{Keccak}-224 for quantum settingGrover on \(SIMON\)Quantum cryptanalysis of Farfalle and (generalised) key-alternating Feistel networksQuantum impossible differential attacks: applications to AES and SKINNYA quantum distinguisher for 7/8-round SMS4 block cipherSynthesizing quantum circuits of AES with lower \(T\)-depth and less qubitsAutomatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentialsQuantum linearization attacksSimon's algorithm and symmetric crypto: generalizations and automatized applicationsQuantum attacks on Lai-Massey structureSponge-based authenticated encryption: security against quantum attackersOn quantum ciphertext indistinguishability, recoverability, and OAEPQuantum attacks on PRFs based on public random permutationsQuantum linear key-recovery attacks using the QFTQuantum search for scaled hash function preimagesQuantum collision attacks on AES-like hashing with low quantum random access memoriesQuantum key-length extensionBreaking LWC candidates: sESTATE and Elephant in quantum settingBreaking tweakable enciphering schemes using Simon's algorithmSome efficient quantum circuit implementations of CamelliaПростейшие надгруппы регулярных представлений неабелевых $2$-групп с циклической подгруппой индекса $2$Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound







This page was built for publication: Quantum attacks without superposition queries: the offline Simon's algorithm