Quantum cryptanalysis in the RAM model: claw-finding attacks on SIKE

From MaRDI portal
Revision as of 01:13, 2 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:2181844

DOI10.1007/978-3-030-26948-7_2zbMath1456.94090OpenAlexW2968685279MaRDI QIDQ2181844

Samuel Jaques, John M. Schanck

Publication date: 20 May 2020

Full work available at URL: https://doi.org/10.1007/978-3-030-26948-7_2




Related Items (27)

Quantum collision attacks on reduced SHA-256 and SHA-512SoK: how (not) to design and implement post-quantum cryptographyThe Supersingular Isogeny Problem in Genus 2 and BeyondThe cost to break SIKE: a comparative hardware-based analysis with AES and SHA-3Improved torsion-point attacks on SIDH variantsLow-gate quantum golden collision findingImprovements to quantum search techniques for block-ciphers, with applications to AESFaster isogenies for post-quantum cryptography: SIKEOn the Isogeny Problem with Torsion Point InformationFinding many collisions via reusable quantum walks. Application to lattice sievingImplementing Grover oracle for lightweight block ciphers under depth constraintsParallel isogeny path finding with limited memoryB-SIDH: supersingular isogeny Diffie-Hellman using twisted torsionEstimating quantum speedups for lattice sievesOn the cost of computing isogenies between supersingular elliptic curvesHash functions from superspecial genus-2 curves using Richelot isogeniesA trade-off between classical and quantum circuit size for an attack against CSIDHAlgebraic approaches for solving isogeny problems of prime power degreesA framework for reducing the overhead of the quantum oracle for use with Grover's algorithm with applications to cryptanalysis of SIKELimonnitsa: making Limonnik-3 post-quantumOptimization of $S$-boxes GOST R 34.12-2015 «Magma» quantum circuits without ancilla qubitsImproved classical cryptanalysis of SIKE in practiceOne-way functions and malleability oracles: hidden shift attacks on isogeny-based protocolsDelegating supersingular isogenies over \(\mathbb{F}_{p^2}\) with cryptographic applicationsSecurity comparisons and performance analyses of post-quantum signature algorithmsImplementing Grover oracles for quantum key search on AES and LowMCHe gives C-sieves on the CSIDH






This page was built for publication: Quantum cryptanalysis in the RAM model: claw-finding attacks on SIKE