Quantum meet-in-the-middle attack on Feistel construction
From MaRDI portal
Publication:6043544
DOI10.1007/s11128-022-03715-2arXiv2107.12724OpenAlexW4353063257MaRDI QIDQ6043544
Publication date: 23 May 2023
Published in: Quantum Information Processing (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/2107.12724
Cites Work
- On quantum slide attacks
- Grover meets Simon -- quantumly attacking the FX-construction
- Quantum Demiric-Selçuk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions
- The security of Feistel ciphers with six rounds or less
- Quantum attacks on some Feistel block ciphers
- Quantum chosen-ciphertext attacks against Feistel ciphers
- Using Bernstein-Vazirani algorithm to attack block ciphers
- Extended meet-in-the-middle attacks on some Feistel constructions
- Quantum forgery attacks on COPA, AES-COPA and marble authenticated encryption algorithms
- Breaking Symmetric Cryptosystems Using Quantum Period Finding
- Generic Key Recovery Attack on Feistel Scheme
- Quantum Random Access Memory
- All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach
- A Meet-in-the-Middle Attack on 8-Round AES
- Preimages for Step-Reduced SHA-2
- The Data Encryption Standard (DES) and its strength against attacks
- On the Power of Quantum Computation
- Quantum Complexity Theory
- Upper Bounds for the Security of Several Feistel Networks
- Quantum Algorithms for Element Distinctness
- Quantum Walk Algorithm for Element Distinctness
This page was built for publication: Quantum meet-in-the-middle attack on Feistel construction