Sponge-based authenticated encryption: security against quantum attackers
From MaRDI portal
Publication:6166985
Recommendations
Cites work
- scientific article; zbMATH DE number 1583804 (Why is no real title available?)
- scientific article; zbMATH DE number 1256737 (Why is no real title available?)
- A note on quantum related-key attacks
- A note on quantum security for post-quantum cryptography
- Authenticated encryption in the face of protocol and side channel leakage
- Beyond \(2^{c/2}\) security in sponge-based authenticated encryption modes
- Breaking symmetric cryptosystems using quantum period finding
- Classical vs quantum random oracles
- Computationally binding quantum commitments
- How to record quantum queries, and applications to quantum indifferentiability
- Leakage-resilient authenticated encryption from leakage-resilient pseudorandom functions
- Measure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA security
- New security notions and feasibility results for authentication of quantum data
- Post-quantum security models for authenticated encryption
- Post-quantum security of the CBC, CFB, OFB, CTR, and XTS modes of operation
- Post-quantum security of the sponge construction
- Quantum Demiric-Selçuk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions
- Quantum attacks without superposition queries: the offline Simon's algorithm
- Quantum chosen-ciphertext attacks against Feistel ciphers
- Quantum computation and quantum information. 10th anniversary edition
- Quantum indistinguishability for public key encryption
- Quantum indistinguishability of random sponges
- Quantum security proofs using semi-classical oracles
- Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts
- Quantum-access-secure message authentication via blind-unforgeability
- Quantum-secure message authentication codes
- Random oracles in a quantum world
- Reconsidering generic composition
- Revocable Quantum Timed-Release Encryption
- Secure signatures and chosen ciphertext security in a quantum computing world
- Semantic security and indistinguishability in the quantum world
- Sponges resist leakage: the case of authenticated encryption
- The theory of hash functions and random oracles. An approach to modern cryptography
- Tighter proofs of CCA security in the quantum random oracle model
Cited in
(3)
This page was built for publication: Sponge-based authenticated encryption: security against quantum attackers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6166985)