Sponge-based authenticated encryption: security against quantum attackers
From MaRDI portal
Publication:6166985
DOI10.1007/978-3-031-17234-2_12zbMATH Open1517.94111MaRDI QIDQ6166985FDOQ6166985
Authors: Christian Janson, Patrick Struck
Publication date: 7 July 2023
Published in: Post-Quantum Cryptography (Search for Journal in Brave)
Recommendations
Cites Work
- Title not available (Why is that?)
- Secure signatures and chosen ciphertext security in a quantum computing world
- Quantum computation and quantum information. 10th anniversary edition
- Title not available (Why is that?)
- Quantum indistinguishability for public key encryption
- Authenticated encryption in the face of protocol and side channel leakage
- A note on quantum security for post-quantum cryptography
- Random oracles in a quantum world
- A note on quantum related-key attacks
- Quantum-access-secure message authentication via blind-unforgeability
- Quantum-secure message authentication codes
- Leakage-resilient authenticated encryption from leakage-resilient pseudorandom functions
- Reconsidering generic composition
- Quantum attacks without superposition queries: the offline Simon's algorithm
- Breaking symmetric cryptosystems using quantum period finding
- Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts
- Quantum Demiric-Selçuk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions
- Quantum chosen-ciphertext attacks against Feistel ciphers
- Computationally binding quantum commitments
- Post-quantum security of the sponge construction
- Tighter proofs of CCA security in the quantum random oracle model
- New security notions and feasibility results for authentication of quantum data
- Post-quantum security of the CBC, CFB, OFB, CTR, and XTS modes of operation
- Post-quantum security models for authenticated encryption
- Beyond \(2^{c/2}\) security in sponge-based authenticated encryption modes
- Measure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA security
- Classical vs quantum random oracles
- How to record quantum queries, and applications to quantum indifferentiability
- Quantum security proofs using semi-classical oracles
- Semantic security and indistinguishability in the quantum world
- Sponges resist leakage: the case of authenticated encryption
- Revocable Quantum Timed-Release Encryption
- Quantum indistinguishability of random sponges
- The theory of hash functions and random oracles. An approach to modern cryptography
Cited In (3)
This page was built for publication: Sponge-based authenticated encryption: security against quantum attackers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6166985)