Quantum Demiric-Selçuk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions
From MaRDI portal
Publication:1796808
DOI10.1007/978-3-319-98113-0_21OpenAlexW2887386775MaRDI QIDQ1796808
Publication date: 17 October 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-98113-0_21
Feistel constructionGrover's algorithmpost-quantum cryptographyclaw finding algorithmDemiric-Selçuk meet-in-the-middle attackQ1 model
Related Items (33)
On Quantum Distinguishers for Type-3 Generalized Feistel Network Based on Separability ⋮ (Quantum) cryptanalysis of misty schemes ⋮ Quantum cryptanalysis on contracting Feistel structures and observation on related-key settings ⋮ Evaluation of quantum cryptanalysis on SPECK ⋮ Beyond quadratic speedups in quantum attacks on symmetric schemes ⋮ Quantum attacks against type-1 generalized Feistel ciphers and applications to CAST-256 ⋮ Quantum attacks on some Feistel block ciphers ⋮ Quantum security analysis of Rocca ⋮ Quantum meet-in-the-middle attack on Feistel construction ⋮ Breaking symmetric cryptosystems using the offline distributed Grover-Meets-Simon algorithm ⋮ Grover on \(SIMON\) ⋮ Post-quantum security on the Lai-Massey scheme ⋮ A quantum distinguisher for 7/8-round SMS4 block cipher ⋮ Optimizing the depth of quantum implementations of linear layers ⋮ Synthesizing quantum circuits of AES with lower \(T\)-depth and less qubits ⋮ Quantum key-recovery attack on Feistel constructions: Bernstein-Vazirani meet Grover algorithm ⋮ Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials ⋮ Quantum linearization attacks ⋮ QCB: efficient quantum-secure authenticated encryption ⋮ Quantum resource estimation for FSR based symmetric ciphers and related Grover's attacks ⋮ Applications of Simon's algorithm in quantum attacks on Feistel variants ⋮ Sponge-based authenticated encryption: security against quantum attackers ⋮ On quantum ciphertext indistinguishability, recoverability, and OAEP ⋮ Quantum linear key-recovery attacks using the QFT ⋮ Quantum forgery attacks on COPA, AES-COPA and marble authenticated encryption algorithms ⋮ Quantum collision attacks on AES-like hashing with low quantum random access memories ⋮ Quantum all-subkeys-recovery attacks on 6-round Feistel-\(2^\ast\) structure based on multi-equations quantum claw finding ⋮ Breaking LWC candidates: sESTATE and Elephant in quantum setting ⋮ Quantum generic attacks on key-alternating Feistel ciphers for shorter keys ⋮ Some efficient quantum circuit implementations of Camellia ⋮ Improved BV-based quantum attack on block ciphers ⋮ Quantum Demiric-Selcuk meet-in-the-middle attacks on reduced-round AES ⋮ Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound
This page was built for publication: Quantum Demiric-Selçuk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions