Quantum chosen-ciphertext attacks against Feistel ciphers
From MaRDI portal
Publication:2290464
DOI10.1007/978-3-030-12612-4_20zbMath1453.94091OpenAlexW2914607305WikidataQ62581719 ScholiaQ62581719MaRDI QIDQ2290464
Yu Sasaki, Akinori Hosoyamada, Ryutaroh Matsumoto, Tetsu Iwata, Gembu Ito
Publication date: 28 January 2020
Full work available at URL: https://doi.org/10.1007/978-3-030-12612-4_20
Related Items
On Quantum Distinguishers for Type-3 Generalized Feistel Network Based on Separability, (Quantum) cryptanalysis of misty schemes, Tight bounds for Simon's algorithm, Quantum cryptanalysis on contracting Feistel structures and observation on related-key settings, Beyond quadratic speedups in quantum attacks on symmetric schemes, Quantum attacks against type-1 generalized Feistel ciphers and applications to CAST-256, Quantum attacks on some Feistel block ciphers, New results on quantum boomerang attacks, Quantum meet-in-the-middle attack on Feistel construction, Quantum key recovery attacks on tweakable Even-Mansour ciphers, Post-quantum security on the Lai-Massey scheme, Quantum cryptanalysis of Farfalle and (generalised) key-alternating Feistel networks, A quantum distinguisher for 7/8-round SMS4 block cipher, Quantum linearization attacks, Applications of Simon's algorithm in quantum attacks on Feistel variants, Simon's algorithm and symmetric crypto: generalizations and automatized applications, Quantum attacks on Lai-Massey structure, Sponge-based authenticated encryption: security against quantum attackers, On quantum ciphertext indistinguishability, recoverability, and OAEP, Quantum all-subkeys-recovery attacks on 6-round Feistel-\(2^\ast\) structure based on multi-equations quantum claw finding, Quantum attacks on sum of Even-Mansour pseudorandom functions, Quantum statistical mechanics of encryption: reaching the speed limit of classical block ciphers, Quantum generic attacks on key-alternating Feistel ciphers for shorter keys, Some efficient quantum circuit implementations of Camellia, Quantum indistinguishability for public key encryption