Dispelling myths on superposition attacks: formal security model and attack analyses
From MaRDI portal
Publication:5918646
DOI10.1007/s10623-022-01017-3zbMath1485.94111arXiv2007.00677OpenAlexW3038151388WikidataQ114849781 ScholiaQ114849781MaRDI QIDQ5918646
Céline Chevalier, Elham Kashefi, Luka Music
Publication date: 31 March 2022
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/2007.00677
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A proof of security of Yao's protocol for two-party computation
- Secure two-party computation in a quantum world
- Breaking Symmetric Cryptosystems Using Quantum Period Finding
- Semantic Security and Indistinguishability in the Quantum World
- Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World
- Constructing Confidential Channels from Authenticated Channels—Public-Key Encryption Revisited
- Composable Security of Delegated Quantum Computation
- Superposition Attacks on Cryptographic Protocols
- Improved Garbled Circuit: Free XOR Gates and Applications
- Universally Composable Quantum Multi-party Computation
- Communication Theory of Secrecy Systems*
- Rapid solution of problems by quantum computation
- Quantum Authentication with Key Recycling
- Computationally Binding Quantum Commitments
- Dispelling myths on superposition attacks: formal security model and attack analyses
This page was built for publication: Dispelling myths on superposition attacks: formal security model and attack analyses