Superposition Attacks on Cryptographic Protocols
From MaRDI portal
Publication:2948260
DOI10.1007/978-3-319-04268-8_9zbMath1395.94278arXiv1108.6313OpenAlexW1650819270MaRDI QIDQ2948260
Jakob Funder, Louis Salvail, Jesper Buus Nielsen, Ivan B. Damgård
Publication date: 30 September 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1108.6313
Related Items
Cryptanalysis and improvement of verifiable quantum \((k,n)\) secret sharing, Quantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptions, Quantum attacks on some Feistel block ciphers, Using Bernstein-Vazirani algorithm to attack block ciphers, Complete analysis of Simon's quantum algorithm with additional collisions, A quantum related-key attack based on the Bernstein-Vazirani algorithm, A note on the post-quantum security of (ring) signatures, Applications of Simon's algorithm in quantum attacks on Feistel variants, On security notions for encryption in a quantum world, Tracing quantum state distinguishers via backtracking, Quantum cryptography beyond quantum key distribution, Relationships between quantum IND-CPA notions, Dispelling myths on superposition attacks: formal security model and attack analyses, Breaking Symmetric Cryptosystems Using Quantum Period Finding, Semantic Security and Indistinguishability in the Quantum World, Improved BV-based quantum attack on block ciphers, Quantum indistinguishability for public key encryption