Quantum cryptanalysis in the RAM model: claw-finding attacks on SIKE
From MaRDI portal
Publication:2181844
DOI10.1007/978-3-030-26948-7_2zbMath1456.94090OpenAlexW2968685279MaRDI QIDQ2181844
Samuel Jaques, John M. Schanck
Publication date: 20 May 2020
Full work available at URL: https://doi.org/10.1007/978-3-030-26948-7_2
Quantum computation (81P68) Cryptography (94A60) Quantum algorithms and complexity in the theory of computing (68Q12)
Related Items (27)
Quantum collision attacks on reduced SHA-256 and SHA-512 ⋮ SoK: how (not) to design and implement post-quantum cryptography ⋮ The Supersingular Isogeny Problem in Genus 2 and Beyond ⋮ The cost to break SIKE: a comparative hardware-based analysis with AES and SHA-3 ⋮ Improved torsion-point attacks on SIDH variants ⋮ Low-gate quantum golden collision finding ⋮ Improvements to quantum search techniques for block-ciphers, with applications to AES ⋮ Faster isogenies for post-quantum cryptography: SIKE ⋮ On the Isogeny Problem with Torsion Point Information ⋮ Finding many collisions via reusable quantum walks. Application to lattice sieving ⋮ Implementing Grover oracle for lightweight block ciphers under depth constraints ⋮ Parallel isogeny path finding with limited memory ⋮ B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion ⋮ Estimating quantum speedups for lattice sieves ⋮ On the cost of computing isogenies between supersingular elliptic curves ⋮ Hash functions from superspecial genus-2 curves using Richelot isogenies ⋮ A trade-off between classical and quantum circuit size for an attack against CSIDH ⋮ Algebraic approaches for solving isogeny problems of prime power degrees ⋮ A framework for reducing the overhead of the quantum oracle for use with Grover's algorithm with applications to cryptanalysis of SIKE ⋮ Limonnitsa: making Limonnik-3 post-quantum ⋮ Optimization of $S$-boxes GOST R 34.12-2015 «Magma» quantum circuits without ancilla qubits ⋮ Improved classical cryptanalysis of SIKE in practice ⋮ One-way functions and malleability oracles: hidden shift attacks on isogeny-based protocols ⋮ Delegating supersingular isogenies over \(\mathbb{F}_{p^2}\) with cryptographic applications ⋮ Security comparisons and performance analyses of post-quantum signature algorithms ⋮ Implementing Grover oracles for quantum key search on AES and LowMC ⋮ He gives C-sieves on the CSIDH
This page was built for publication: Quantum cryptanalysis in the RAM model: claw-finding attacks on SIKE