Post-quantum security on the Lai-Massey scheme
From MaRDI portal
Publication:6109706
DOI10.1007/S10623-023-01225-5zbMath1530.81059OpenAlexW4367368809MaRDI QIDQ6109706
Wenling Wu, Zhongya Zhang, Bolin Wang, Han Sui
Publication date: 28 July 2023
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-023-01225-5
Cryptography (94A60) Eta-invariants, Chern-Simons invariants (58J28) Quantum coherence, entanglement, quantum correlations (81P40) Quantum coding (general) (81P70) Quantum cryptography (quantum-theoretic aspects) (81P94) Computer security (68M25)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A construction of a cipher from a single pseudorandom permutation.
- Grover meets Simon -- quantumly attacking the FX-construction
- Quantum Demiric-Selçuk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions
- Pseudorandomness analysis of the (extended) Lai-Massey scheme
- Quantum cryptanalysis on contracting Feistel structures and observation on related-key settings
- Quantum attacks against type-1 generalized Feistel ciphers and applications to CAST-256
- Quantum chosen-ciphertext attacks against Feistel ciphers
- Breaking Symmetric Cryptosystems Using Quantum Period Finding
- How to Protect DES Against Exhaustive Key Search
- How to Construct Pseudorandom Permutations from Pseudorandom Functions
- Markov Ciphers and Differential Cryptanalysis
- On the Power of Quantum Computation
- On Quantum Distinguishers for Type-3 Generalized Feistel Network Based on Separability
- Selected Areas in Cryptography
- How to protect DES against exhaustive key search (an analysis of DESX).
- QCB: efficient quantum-secure authenticated encryption
This page was built for publication: Post-quantum security on the Lai-Massey scheme