Quantum Demiric-Selçuk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions

From MaRDI portal
Publication:1796808

DOI10.1007/978-3-319-98113-0_21OpenAlexW2887386775MaRDI QIDQ1796808

Akinori Hosoyamada, Yu Sasaki

Publication date: 17 October 2018

Full work available at URL: https://doi.org/10.1007/978-3-319-98113-0_21




Related Items (33)

On Quantum Distinguishers for Type-3 Generalized Feistel Network Based on Separability(Quantum) cryptanalysis of misty schemesQuantum cryptanalysis on contracting Feistel structures and observation on related-key settingsEvaluation of quantum cryptanalysis on SPECKBeyond quadratic speedups in quantum attacks on symmetric schemesQuantum attacks against type-1 generalized Feistel ciphers and applications to CAST-256Quantum attacks on some Feistel block ciphersQuantum security analysis of RoccaQuantum meet-in-the-middle attack on Feistel constructionBreaking symmetric cryptosystems using the offline distributed Grover-Meets-Simon algorithmGrover on \(SIMON\)Post-quantum security on the Lai-Massey schemeA quantum distinguisher for 7/8-round SMS4 block cipherOptimizing the depth of quantum implementations of linear layersSynthesizing quantum circuits of AES with lower \(T\)-depth and less qubitsQuantum key-recovery attack on Feistel constructions: Bernstein-Vazirani meet Grover algorithmAutomatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentialsQuantum linearization attacksQCB: efficient quantum-secure authenticated encryptionQuantum resource estimation for FSR based symmetric ciphers and related Grover's attacksApplications of Simon's algorithm in quantum attacks on Feistel variantsSponge-based authenticated encryption: security against quantum attackersOn quantum ciphertext indistinguishability, recoverability, and OAEPQuantum linear key-recovery attacks using the QFTQuantum forgery attacks on COPA, AES-COPA and marble authenticated encryption algorithmsQuantum collision attacks on AES-like hashing with low quantum random access memoriesQuantum all-subkeys-recovery attacks on 6-round Feistel-\(2^\ast\) structure based on multi-equations quantum claw findingBreaking LWC candidates: sESTATE and Elephant in quantum settingQuantum generic attacks on key-alternating Feistel ciphers for shorter keysSome efficient quantum circuit implementations of CamelliaImproved BV-based quantum attack on block ciphersQuantum Demiric-Selcuk meet-in-the-middle attacks on reduced-round AESFinding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound




This page was built for publication: Quantum Demiric-Selçuk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions