Another Subexponential-time Quantum Algorithm for the Dihedral Hidden Subgroup Problem

From MaRDI portal
Publication:2958406

DOI10.4230/LIPIcs.TQC.2013.20zbMath1356.68076arXiv1112.3333OpenAlexW2242279290MaRDI QIDQ2958406

Greg Kuperberg

Publication date: 1 February 2017

Full work available at URL: https://arxiv.org/abs/1112.3333




Related Items (36)

SoK: how (not) to design and implement post-quantum cryptographyCSIDH on the SurfaceLow-gate quantum golden collision findingQuantum lattice enumeration and tweaking discrete pruningOn the hardness of the computational ring-LWR problem and its applicationsHidden shift quantum cryptanalysis and implicationsPost-quantum adaptor signature for privacy-preserving off-chain paymentsPractical post-quantum signature schemes from isomorphism problems of trilinear formsNew results on quantum boomerang attacksQuantum algorithms for typical hard problems: a perspective of cryptanalysisA lower bound on the length of signatures based on group actions and generic isogeniesA subexponential-time, polynomial quantum space algorithm for inverting the CM group actionQuantum impossible differential attacks: applications to AES and SKINNYFull quantum equivalence of group action DLog and CDH, and moreTake your MEDS: digital signatures from matrix code equivalence\textsf{CSI-Otter}: isogeny-based (partially) blind signatures from the class group action with a twistQuantum algorithm based on the \(\varepsilon\)-random linear disequations for the continuous hidden shift problemQuantum time/memory/data tradeoff attacksTwo remarks on the vectorization problemQuantum linear key-recovery attacks using the QFTCryptographic group actions and applicationsEstimating quantum speedups for lattice sievesImproved classical and quantum algorithms for subset-sumTowards practical key exchange from ordinary isogeny graphsCSIDH: an efficient post-quantum commutative group actionQuantum pattern matching fast on averageGroup signatures and more from isogenies and lattices: generic, simple, and efficientA trade-off between classical and quantum circuit size for an attack against CSIDHLossy CSI-fish: efficient signature scheme with tight reduction to decisional CSIDH-512Threshold schemes from isogeny assumptionsLeveraging the hardness of dihedral coset problem for quantum cryptographyQuantum-Secure Symmetric-Key Cryptography Based on Hidden ShiftsA fusion algorithm for solving the hidden shift problem in finite abelian groupsOptimal merging in quantum \(k\)-xor and \(k\)-sum algorithmsHe gives C-sieves on the CSIDHQuantum security analysis of CSIDH




This page was built for publication: Another Subexponential-time Quantum Algorithm for the Dihedral Hidden Subgroup Problem