Quantum key search with side channel advice
From MaRDI portal
Publication:1746986
DOI10.1007/978-3-319-72565-9_21zbMATH Open1384.94085OpenAlexW2604702841MaRDI QIDQ1746986FDOQ1746986
Ashley Montanaro, D. J. Shepherd, Elisabeth Oswald, Daniel P. Martin
Publication date: 26 April 2018
Full work available at URL: https://eprint.iacr.org/2017/171
Cryptography (94A60) Quantum computation (81P68) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- On the Power of Quantum Computation
- An almost optimal algorithm for unbounded searching
- Quantum Random Access Memory
- Power Analysis Attacks
- Breaking Symmetric Cryptosystems Using Quantum Period Finding
- Applying Grover’s Algorithm to AES: Quantum Resource Estimates
- Security Evaluations beyond Computing Power
- Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations
- Counting Keys in Parallel After a Side Channel Attack
- Post-Quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of Operation
- Fast and Memory-Efficient Key Recovery in Side-Channel Attacks
- RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis
- Quantum Search with Advice
- Improving DPA by Peak Distribution Analysis
Cited In (1)
This page was built for publication: Quantum key search with side channel advice
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1746986)