Breaking LWC candidates: sESTATE and Elephant in quantum setting
From MaRDI portal
Publication:2035448
DOI10.1007/s10623-021-00875-7zbMath1466.94038MaRDI QIDQ2035448
Tairong Shi, Wenling Wu, Bin Hu, Sengpeng Wang, Jie Guan
Publication date: 24 June 2021
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-021-00875-7
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- On quantum slide attacks
- CBC MACs for arbitrary-length messages: The three-key constructions
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm
- New hash functions and their use in authentication and set equality
- Grover meets Simon -- quantumly attacking the FX-construction
- Quantum key-recovery on full AEZ
- Quantum Demiric-Selçuk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions
- Quantum attacks without superposition queries: the offline Simon's algorithm
- Applying Grover’s Algorithm to AES: Quantum Resource Estimates
- Post-Quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of Operation
- Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
- Breaking Symmetric Cryptosystems Using Quantum Period Finding
- Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World
- How to Securely Release Unverified Plaintext in Authenticated Encryption
- On Fast and Provably Secure Message Authentication Based on Universal Hashing
- A Provable-Security Treatment of the Key-Wrap Problem
- Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts
- SPONGENT: The Design Space of Lightweight Cryptographic Hashing
- Stronger Security Bounds for Wegman-Carter-Shoup Authenticators