An efficient quantum collision search algorithm and implications on symmetric cryptography

From MaRDI portal
Publication:1703922

DOI10.1007/978-3-319-70697-9_8zbMath1380.81085OpenAlexW2768789137MaRDI QIDQ1703922

María Naya-Plasencia, André Schrottenloher, André Chailloux

Publication date: 8 March 2018

Full work available at URL: https://doi.org/10.1007/978-3-319-70697-9_8




Related Items (28)

Quantum collision attacks on reduced SHA-256 and SHA-512SoK: how (not) to design and implement post-quantum cryptographyThe Power of Few Qubits and Collisions – Subset Sum Below Grover’s BoundThe cost to break SIKE: a comparative hardware-based analysis with AES and SHA-3Low-gate quantum golden collision findingOn forging SPHINCS\textsuperscript{+}-Haraka signatures on a fault-tolerant quantum computerQuantum reversible circuit of AES-128Efficient quantum algorithms related to autocorrelation spectrumQuantum attacks on some Feistel block ciphersImproved attacks against reduced-round WhirlwindFinding many collisions via reusable quantum walks. Application to lattice sievingTriangulating rebound attack on AES-like hashingNostradamus goes quantumSynthesizing quantum circuits of AES with lower \(T\)-depth and less qubitsExploring SAT for cryptanalysis: (quantum) collision attacks against 6-round SHA-3Quantum time/memory/data tradeoff attacksAutomatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentialsQuantum search for scaled hash function preimagesQuantum forgery attacks on COPA, AES-COPA and marble authenticated encryption algorithmsQuantum collision attacks on AES-like hashing with low quantum random access memoriesQuantum attacks on sum of Even-Mansour pseudorandom functionsTime-space complexity of quantum search algorithms in symmetric cryptanalysis: applying to AES and SHA-2Quantum algorithms for learning Walsh spectra of multi-output Boolean functionsSome efficient quantum circuit implementations of CamelliaQuantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functionsOn subset-resilient hash function familiesFinding hash collisions with quantum computers by using differential trails with smaller probability than birthday boundOptimal merging in quantum \(k\)-xor and \(k\)-sum algorithms




This page was built for publication: An efficient quantum collision search algorithm and implications on symmetric cryptography