Allocating rotational cryptanalysis-based preimage attack on 4-round \textsc{Keccak}-224 for quantum setting
From MaRDI portal
Publication:6098292
DOI10.1007/s11128-023-03907-4OpenAlexW4379209478MaRDI QIDQ6098292
Hui Li, Juntao Gao, Baocang Wang, Xue-Lian Li, Runsong Wang
Publication date: 13 June 2023
Published in: Quantum Information Processing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11128-023-03907-4
amplitude amplificationrotational cryptanalysispreimage attacklinearization of \textsc{Keccak}-\(f\)SKW algorithm
Cites Work
- Estimating the cost of generic quantum pre-image attacks on SHA-2 and SHA-3
- Grover meets Simon -- quantumly attacking the FX-construction
- Fundamentals of quantum information. Quantum computation, communication, decoherence and all that
- Cryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\)
- Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound
- Quantum collision attacks on reduced SHA-256 and SHA-512
- Quantum attacks without superposition queries: the offline Simon's algorithm
- Cryptanalysis against symmetric-key schemes with online classical queries and offline quantum computations
- Preimage attacks on round-reduced Keccak-224/256 via an allocating approach
- Quantum collision attacks on AES-like hashing with low quantum random access memories
- Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak
- Quantum Random Access Memory
- Beating Brute Force for Systems of Polynomial Equations over Finite Fields
- Cryptanalysis of the Hash Functions MD4 and RIPEMD
- How to Break MD5 and Other Hash Functions
- Efficient Collision Search Attacks on SHA-0
- Finding Collisions in the Full SHA-1
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Allocating rotational cryptanalysis-based preimage attack on 4-round \textsc{Keccak}-224 for quantum setting