Quantum key-recovery on full AEZ
From MaRDI portal
Publication:1746983
DOI10.1007/978-3-319-72565-9_20zbMATH Open1384.94037OpenAlexW2620891730MaRDI QIDQ1746983FDOQ1746983
Authors: Xavier Bonnetain
Publication date: 26 April 2018
Full work available at URL: https://hal.inria.fr/hal-01650026/file/qAEZ.pdf
Recommendations
- Weak keys for AEZ, and the external key padding attack
- QCB: efficient quantum-secure authenticated encryption
- Collision attacks against CAESAR candidates. Forgery and key-recovery against AEZ and Marble
- Breaking symmetric cryptosystems using quantum period finding
- Breaking tweakable enciphering schemes using Simon's algorithm
authenticated encryptionquantum cryptanalysisCAESAR competitionSimon's algorithmAEZsymmetric cryptanalysis
Cryptography (94A60) Quantum cryptography (quantum-theoretic aspects) (81P94) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Title not available (Why is that?)
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- On the Power of Quantum Computation
- Title not available (Why is that?)
- A Subexponential-Time Quantum Algorithm for the Dihedral Hidden Subgroup Problem
- Advances in cryptology -- EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26--30, 2015. Proceedings. Part I
- Breaking symmetric cryptosystems using quantum period finding
- SPHINCS: practical stateless hash-based signatures
- Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts
- Robust authenticated-encryption AEZ and the problem that it solves
- Post-quantum cryptography. 7th international workshop, PQCrypto 2016, Fukuoka, Japan, February 24--26, 2016. Proceedings
- Collision attacks against CAESAR candidates. Forgery and key-recovery against AEZ and Marble
- Post-quantum security of the CBC, CFB, OFB, CTR, and XTS modes of operation
- Post-quantum security models for authenticated encryption
Cited In (19)
- Noisy Simon period finding
- Quantum attacks against type-1 generalized Feistel ciphers and applications to CAST-256
- Quantum search for scaled hash function preimages
- Quantum reversible circuit of AES-128
- Weak keys for AEZ, and the external key padding attack
- Quantum linearization attacks
- Quantum forgery attacks on COPA, AES-COPA and marble authenticated encryption algorithms
- Beyond quadratic speedups in quantum attacks on symmetric schemes
- Breaking LWC candidates: sESTATE and Elephant in quantum setting
- Collision attacks against CAESAR candidates. Forgery and key-recovery against AEZ and Marble
- Breaking tweakable enciphering schemes using Simon's algorithm
- A quantum distinguisher for 7/8-round SMS4 block cipher
- On Quantum Distinguishers for Type-3 Generalized Feistel Network Based on Separability
- Quantum attacks on sum of Even-Mansour pseudorandom functions
- New Demiric–Selçuk meet-in-the-middle attacks on Misty and Feistel schemes
- Tight bounds for Simon's algorithm
- Applications of Simon's algorithm in quantum attacks on Feistel variants
- QCB: efficient quantum-secure authenticated encryption
- Quantum key recovery attacks on tweakable Even-Mansour ciphers
This page was built for publication: Quantum key-recovery on full AEZ
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1746983)