Quantum attacks against BBB secure PRFs or MACs built from public random permutations
From MaRDI portal
Publication:2686166
DOI10.1007/S11128-022-03774-5OpenAlexW4313334108MaRDI QIDQ2686166FDOQ2686166
Publication date: 24 February 2023
Published in: Quantum Information Processing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11128-022-03774-5
Recommendations
Cites Work
- Title not available (Why is that?)
- On the Power of Quantum Computation
- How to protect DES against exhaustive key search (an analysis of DESX).
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Fast Software Encryption
- The Sum of CBC MACs Is a Secure PRF
- A New Variant of PMAC: Beyond the Birthday Bound
- SPONGENT: The Design Space of Lightweight Cryptographic Hashing
- Grover meets Simon -- quantumly attacking the FX-construction
- Breaking Symmetric Cryptosystems Using Quantum Period Finding
- Quantum algorithms for the \(k\)-XOR problem
- Information-theoretic indistinguishability via the chi-squared method
- Tight bounds for Simon's algorithm
- Mind the composition: birthday bound attacks on EWCDMD and SoKAC21
- Tight security bounds for double-block hash-then-sum MACs
- How to build pseudorandom functions from public random permutations
- Quantum collision attacks on AES-like hashing with low quantum random access memories
- Building Blockcipher from Tweakable Blockcipher: Extending FSE 2009 Proposal
- BBB Secure Nonce Based MAC Using Public Permutations
- Attacks on beyond-birthday-bound MACs in the quantum setting
- Quantum attacks on sum of Even-Mansour pseudorandom functions
- Applications of Simon's algorithm in quantum attacks on Feistel variants
Cited In (6)
- Attacks on beyond-birthday-bound MACs in the quantum setting
- Quantum linearization attacks
- Breaking symmetric cryptosystems using the offline distributed Grover-Meets-Simon algorithm
- Quantum key recovery attacks on tweakable Even-Mansour ciphers
- Multi-user BBB security of public permutations based MAC
- Quantum attacks on beyond-birthday-bound MACs
Uses Software
This page was built for publication: Quantum attacks against BBB secure PRFs or MACs built from public random permutations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2686166)