Quantum key recovery attacks on tweakable Even-Mansour ciphers
From MaRDI portal
Publication:6050248
DOI10.1007/s11128-023-04098-8OpenAlexW4386409884MaRDI QIDQ6050248
Publication date: 18 September 2023
Published in: Quantum Information Processing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11128-023-04098-8
Cites Work
- Unnamed Item
- Key recovery attacks on iterated Even-Mansour encryption schemes
- On quantum slide attacks
- On the resilience of Even-Mansour to invariant permutations
- A construction of a cipher from a single pseudorandom permutation.
- Output masking of tweakable Even-Mansour can be eliminated for message authentication code
- Grover meets Simon -- quantumly attacking the FX-construction
- Quantum key-recovery on full AEZ
- On quantum related-key attacks on iterated Even-Mansour ciphers
- Slidex attacks on the Even-Mansour encryption scheme
- Evaluation of Grover's algorithm toward quantum cryptanalysis on ChaCha
- Improved BV-based quantum attack on block ciphers
- Attacks on beyond-birthday-bound MACs in the quantum setting
- Quantum collision attacks on reduced SHA-256 and SHA-512
- Post-quantum security of the Even-Mansour cipher
- 4-round Luby-Rackoff construction is a qPRP
- Quantum attacks on some Feistel block ciphers
- Quantum attacks on sum of Even-Mansour pseudorandom functions
- Quantum chosen-ciphertext attacks against Feistel ciphers
- Using Bernstein-Vazirani algorithm to attack block ciphers
- A quantum related-key attack based on the Bernstein-Vazirani algorithm
- Quantum key-recovery attack on Feistel constructions: Bernstein-Vazirani meet Grover algorithm
- Quantum security of grain-128/grain-128a stream cipher against HHL algorithm
- Quantum attacks against BBB secure PRFs or MACs built from public random permutations
- Applications of Simon's algorithm in quantum attacks on Feistel variants
- Quantum forgery attacks on COPA, AES-COPA and marble authenticated encryption algorithms
- Quantum collision attacks on AES-like hashing with low quantum random access memories
- Breaking Symmetric Cryptosystems Using Quantum Period Finding
- Minimizing the Two-Round Even-Mansour Cipher
- Tweaking Even-Mansour Ciphers
- On the Power of Quantum Computation
- Quantum cryptanalysis of hash and claw-free functions
This page was built for publication: Quantum key recovery attacks on tweakable Even-Mansour ciphers