Quantum Key Recovery Attacks on 3-Round Feistel-2 Structure Without Quantum Encryption Oracles
From MaRDI portal
Publication:6487415
DOI10.1007/978-3-031-15255-9_7zbMath1514.81104MaRDI QIDQ6487415
Takanori Daiza, Kazuki Yoneyama
Publication date: 18 January 2023
Cites Work
- Unnamed Item
- Unnamed Item
- On quantum slide attacks
- Grover meets Simon -- quantumly attacking the FX-construction
- Quantum Demiric-Selçuk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions
- Efficient dissection of bicomposite problems with cryptanalytic applications
- Optimum attack on 3-round Feistel-2 structure
- Quantum cryptanalysis on contracting Feistel structures and observation on related-key settings
- Quantum attacks without superposition queries: the offline Simon's algorithm
- Breaking Symmetric Cryptosystems Using Quantum Period Finding
- Generic Key Recovery Attack on Feistel Scheme
- Meet-in-the-Middle Attacks on Generic Feistel Constructions
- Security Analysis of Key-Alternating Feistel Ciphers
- Reversible and Quantum Circuit Optimization: A Functional Approach
- All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach
- New Attacks on Feistel Structures with Improved Memory Complexities
- A Meet-in-the-Middle Attack on 8-Round AES
- How to Construct Pseudorandom Permutations from Pseudorandom Functions
- On the Power of Quantum Computation
- Quantum cryptanalysis of hash and claw-free functions
This page was built for publication: Quantum Key Recovery Attacks on 3-Round Feistel-2 Structure Without Quantum Encryption Oracles