An efficient quantum collision search algorithm and implications on symmetric cryptography
From MaRDI portal
Recommendations
- Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound
- Low-communication parallel quantum multi-target preimage search
- Breaking symmetric cryptosystems using quantum period finding
- Low-gate quantum golden collision finding
- Quantum multicollision-finding algorithm
Cited in
(39)- Quantum time/memory/data tradeoff attacks
- Low-communication parallel quantum multi-target preimage search
- On subset-resilient hash function families
- Finding many collisions via reusable quantum walks. Application to lattice sieving
- Quantum algorithms for the \(k\)-XOR problem
- The cost to break SIKE: a comparative hardware-based analysis with AES and SHA-3
- CryptAttackTester: high-assurance attack analysis
- Improved attacks against reduced-round Whirlwind
- Collision resistance of the OAM-based quantum hashing
- Improvements to quantum search techniques for block-ciphers, with applications to AES
- Low-gate quantum golden collision finding
- Efficient quantum algorithms related to autocorrelation spectrum
- Synthesizing quantum circuits of AES with lower \(T\)-depth and less qubits
- Quantum reversible circuit of AES-128
- SoK: how (not) to design and implement post-quantum cryptography
- Exploiting preprocessing for quantum search to break parameters for \(\mathcal{MQ}\) cryptosystems
- The Power of Few Qubits and Collisions – Subset Sum Below Grover’s Bound
- Improved quantum algorithms for the k-XOR problem
- Quantum collision attacks on AES-like hashing with low quantum random access memories
- Quantum attacks on some Feistel block ciphers
- Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials
- Quantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functions
- Quantum algorithms for learning Walsh spectra of multi-output Boolean functions
- Quantum search for scaled hash function preimages
- Quantum collision attacks on reduced SHA-256 and SHA-512
- Quantum attacks on sum of Even-Mansour pseudorandom functions
- Triangulating rebound attack on AES-like hashing
- Estimating the cost of generic quantum pre-image attacks on SHA-2 and SHA-3
- On quantum secure compressing pseudorandom functions
- Quantum attacks on hash constructions with low quantum random access memory
- Nostradamus goes quantum
- Quantum forgery attacks on COPA, AES-COPA and marble authenticated encryption algorithms
- Some efficient quantum circuit implementations of Camellia
- Time-space complexity of quantum search algorithms in symmetric cryptanalysis: applying to AES and SHA-2
- Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound
- Exploring SAT for cryptanalysis: (quantum) collision attacks against 6-round SHA-3
- Optimal merging in quantum \(k\)-xor and \(k\)-sum algorithms
- On forging SPHINCS\textsuperscript{+}-Haraka signatures on a fault-tolerant quantum computer
- Towards quantum large-scale password guessing on real-world distributions
This page was built for publication: An efficient quantum collision search algorithm and implications on symmetric cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1703922)