Quantum key search with side channel advice
From MaRDI portal
Publication:1746986
DOI10.1007/978-3-319-72565-9_21zbMath1384.94085OpenAlexW2604702841MaRDI QIDQ1746986
Ashley Montanaro, Elisabeth Oswald, Daniel P. Martin, D. J. Shepherd
Publication date: 26 April 2018
Full work available at URL: https://eprint.iacr.org/2017/171
Quantum computation (81P68) Cryptography (94A60) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- An almost optimal algorithm for unbounded searching
- Counting Keys in Parallel After a Side Channel Attack
- Applying Grover’s Algorithm to AES: Quantum Resource Estimates
- Post-Quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of Operation
- Fast and Memory-Efficient Key Recovery in Side-Channel Attacks
- Breaking Symmetric Cryptosystems Using Quantum Period Finding
- RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis
- Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations
- Quantum Search with Advice
- Improving DPA by Peak Distribution Analysis
- Quantum Random Access Memory
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- On the Power of Quantum Computation
- Security Evaluations beyond Computing Power
- Power Analysis Attacks
This page was built for publication: Quantum key search with side channel advice