Attacks on beyond-birthday-bound MACs in the quantum setting
From MaRDI portal
Publication:2118560
Recommendations
- Quantum attacks on beyond-birthday-bound MACs
- Quantum attacks against BBB secure PRFs or MACs built from public random permutations
- Generic attacks against beyond-birthday-bound MACs
- Attacks on quantum key distribution protocols that employ non-ITS authentication
- Attacks on fixed apparatus quantum key distribution schemes
- Quantum security of NMAC and related constructions. PRF domain extension against quantum attacks
- scientific article
- Attacks and improvement on ``Quantum direct communication with mutual authentication
- Beyond quadratic speedups in quantum attacks on symmetric schemes
Cites work
- scientific article; zbMATH DE number 1256737 (Why is no real title available?)
- scientific article; zbMATH DE number 1942427 (Why is no real title available?)
- scientific article; zbMATH DE number 2103524 (Why is no real title available?)
- 3kf9: enhancing 3GPP-MAC beyond the birthday bound
- A new variant of PMAC: beyond the birthday bound
- Adversary lower bound for the \(k\)-sum problem
- Blockcipher-based MACs: beyond the birthday bound without message length
- Breaking symmetric cryptosystems using quantum period finding
- Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound
- Full PRF-secure message authentication code based on tweakable block cipher
- Generic attacks against beyond-birthday-bound MACs
- Grover meets Simon -- quantumly attacking the FX-construction
- How to Protect DES Against Exhaustive Key Search
- How to build optimally secure PRFs using block ciphers
- How to protect DES against exhaustive key search (an analysis of DESX).
- Information Security and Cryptology
- On Quantum Distinguishers for Type-3 Generalized Feistel Network Based on Separability
- On the Power of Quantum Computation
- Optimal merging in quantum \(k\)-xor and \(k\)-sum algorithms
- Progress in Cryptology - INDOCRYPT 2004
- Quantum algorithms for the \(k\)-XOR problem
- Quantum collision attacks on AES-like hashing with low quantum random access memories
- Quantum-secure message authentication codes
- The sum of CBC MACs is a secure PRF
- Tight security bounds for double-block hash-then-sum MACs
Cited in
(13)- Quantum attacks against BBB secure PRFs or MACs built from public random permutations
- Breaking permutation-based pseudorandom cryptographic schemes using distributed exact quantum algorithms
- Quantum attacks on Lai-Massey structure
- Quantum-secure message authentication codes
- Simon's algorithm and symmetric crypto: generalizations and automatized applications
- Quantum linearization attacks
- Forgery attacks on several beyond-birthday-bound secure MACs
- Quantum attacks on PRFs based on public random permutations
- Beyond quadratic speedups in quantum attacks on symmetric schemes
- Generic attacks against beyond-birthday-bound MACs
- Quantum-secure (non-)sequential aggregate message authentication codes
- Quantum key recovery attacks on tweakable Even-Mansour ciphers
- Quantum attacks on beyond-birthday-bound MACs
This page was built for publication: Attacks on beyond-birthday-bound MACs in the quantum setting
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2118560)