Nostradamus goes quantum
From MaRDI portal
Publication:6135450
DOI10.1007/978-3-031-22969-5_20zbMath1530.81050OpenAlexW4320082947MaRDI QIDQ6135450
Marc Fischlin, Moritz Huppert, Barbara Jiabao Benedikt
Publication date: 25 August 2023
Published in: Advances in Cryptology – ASIACRYPT 2022 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-22969-5_20
Cryptography (94A60) Dilations, extensions, compressions of linear operators (47A20) Complexity classes (hierarchies, relations among complexity classes, etc.) (68Q15) Quantum cryptography (quantum-theoretic aspects) (81P94) Computer security (68M25)
Cites Work
- Unnamed Item
- Unnamed Item
- On the complexity of the herding attack and some related attacks on hash functions
- Security arguments for digital signatures and blind signatures
- Estimating the cost of generic quantum pre-image attacks on SHA-2 and SHA-3
- An efficient quantum collision search algorithm and implications on symmetric cryptography
- Efficient construction of diamond structures
- Low-communication parallel quantum multi-target preimage search
- Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound
- Quantum collision attacks on reduced SHA-256 and SHA-512
- On finding quantum multi-collisions
- Quantum search for scaled hash function preimages
- New results on \(\mathsf{Gimli}\): full-permutation distinguishers and improved collisions
- Quantum collision attacks on AES-like hashing with low quantum random access memories
- On Diamond Structures and Trojan Message Attacks
- Provable Chosen-Target-Forced-Midfix Preimage Resistance
- Random Oracles in a Quantum World
- Herding Hash Functions and the Nostradamus Attack
- Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård
- Advances in Cryptology - EUROCRYPT 2004
- Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work
- Quantum cryptanalysis of hash and claw-free functions
- Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials
This page was built for publication: Nostradamus goes quantum