Pages that link to "Item:Q2948260"
From MaRDI portal
The following pages link to Superposition Attacks on Cryptographic Protocols (Q2948260):
Displayed 17 items.
- Cryptanalysis and improvement of verifiable quantum \((k,n)\) secret sharing (Q264629) (← links)
- Quantum cryptography beyond quantum key distribution (Q908054) (← links)
- Improved BV-based quantum attack on block ciphers (Q2110996) (← links)
- Quantum indistinguishability for public key encryption (Q2118562) (← links)
- Quantum attacks on some Feistel block ciphers (Q2182081) (← links)
- Using Bernstein-Vazirani algorithm to attack block ciphers (Q2414939) (← links)
- Quantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptions (Q2661695) (← links)
- Complete analysis of Simon's quantum algorithm with additional collisions (Q2681014) (← links)
- A quantum related-key attack based on the Bernstein-Vazirani algorithm (Q2681588) (← links)
- Applications of Simon's algorithm in quantum attacks on Feistel variants (Q2687219) (← links)
- Relationships between quantum IND-CPA notions (Q2695636) (← links)
- Breaking Symmetric Cryptosystems Using Quantum Period Finding (Q2829216) (← links)
- Semantic Security and Indistinguishability in the Quantum World (Q2829943) (← links)
- Dispelling myths on superposition attacks: formal security model and attack analyses (Q5918646) (← links)
- A note on the post-quantum security of (ring) signatures (Q6113964) (← links)
- On security notions for encryption in a quantum world (Q6169490) (← links)
- Tracing quantum state distinguishers via backtracking (Q6190129) (← links)