Applications of Simon's algorithm in quantum attacks on Feistel variants (Q2687219): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
ReferenceBot (talk | contribs)
Changed an Item
 
(7 intermediate revisions by 5 users not shown)
Property / author
 
Property / author: Jian-Sheng Guo / rank
Normal rank
 
Property / author
 
Property / author: Jian-Sheng Guo / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: CLEFIA / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: MISTY / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s11128-021-03027-x / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W3136201411 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum cryptography beyond quantum key distribution / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum Demiric-Selçuk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum key-recovery on full AEZ / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis against symmetric-key schemes with online classical queries and offline quantum computations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Random Oracles in a Quantum World / rank
 
Normal rank
Property / cites work
 
Property / cites work: Breaking Symmetric Cryptosystems Using Quantum Period Finding / rank
 
Normal rank
Property / cites work
 
Property / cites work: Superposition Attacks on Cryptographic Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum-Secure Message Authentication Codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Power of Quantum Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum attacks on some Feistel block ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: On quantum slide attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum chosen-ciphertext attacks against Feistel ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: On quantum related-key attacks on iterated Even-Mansour ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Grover meets Simon -- quantumly attacking the FX-construction / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum attacks against type-1 generalized Feistel ciphers and applications to CAST-256 / rank
 
Normal rank
Property / cites work
 
Property / cites work: New block encryption algorithm MISTY / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses / rank
 
Normal rank
Property / cites work
 
Property / cites work: The 128-Bit Blockcipher CLEFIA (Extended Abstract) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4718481 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum-access-secure message authentication via blind-unforgeability / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4819589 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5364336 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key-dependent S-boxes and differential cryptanalysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Probability distributions of correlation and differentials in block ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Complete analysis of Simon's quantum algorithm with additional collisions / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Construct Pseudorandom Permutations from Pseudorandom Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Generic Attacks on Feistel Networks with Internal Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Results on the Pseudorandomness of Some Blockcipher Constructions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2707426 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Another look at success probability of linear cryptanalysis / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 15:11, 31 July 2024

scientific article
Language Label Description Also known as
English
Applications of Simon's algorithm in quantum attacks on Feistel variants
scientific article

    Statements

    Applications of Simon's algorithm in quantum attacks on Feistel variants (English)
    0 references
    0 references
    0 references
    0 references
    1 March 2023
    0 references
    quantum computation
    0 references
    quantum cryptanalysis
    0 references
    Feistel variants
    0 references
    Simon's algorithm
    0 references
    distinguishing attack
    0 references
    key-recovery attack
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references