Quantum impossible differential attacks: applications to AES and SKINNY
DOI10.1007/S10623-023-01280-YOpenAlexW4385953839MaRDI QIDQ6130615FDOQ6130615
Authors: N. David, María Naya-Plasencia, André Schrottenloher
Publication date: 3 April 2024
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-023-01280-y
Recommendations
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Quantum algorithms and complexity in the theory of computing (68Q12) Quantum computation (81P68) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- Title not available (Why is that?)
- Strengths and Weaknesses of Quantum Computing
- Quantum Walk Algorithm for Element Distinctness
- Title not available (Why is that?)
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- The Solovay--Kitaev algorithm
- Title not available (Why is that?)
- Quantum cryptanalysis of hash and claw-free functions
- Fundamentals of quantum information. Quantum computation, communication, decoherence and all that
- Title not available (Why is that?)
- A Meet-in-the-Middle Attack on 8-Round AES
- Title not available (Why is that?)
- Improved impossible differential cryptanalysis of 7-round AES-128
- The block cipher \textsc{Square}
- Scrutinizing and improving impossible differential attacks: applications to CLEFIA, Camellia, Lblock and Simon
- Another Subexponential-time Quantum Algorithm for the Dihedral Hidden Subgroup Problem
- Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials
- On quantum slide attacks
- Quantum attacks without superposition queries: the offline Simon's algorithm
- Breaking symmetric cryptosystems using quantum period finding
- On finding quantum multi-collisions
- Improved key recovery attacks on reduced-round AES in the single-key setting
- Making the impossible possible
- Using Bernstein-Vazirani algorithm to attack block ciphers
Cited In (3)
This page was built for publication: Quantum impossible differential attacks: applications to AES and SKINNY
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6130615)