Quantum attacks on beyond-birthday-bound MACs
From MaRDI portal
Publication:6167739
Recommendations
- Attacks on beyond-birthday-bound MACs in the quantum setting
- Quantum attacks against BBB secure PRFs or MACs built from public random permutations
- Attacks on quantum key distribution protocols that employ non-ITS authentication
- scientific article
- Generic attacks against beyond-birthday-bound MACs
- Attacks on fixed apparatus quantum key distribution schemes
- Quantum attacks on public-key cryptosystems
- Attacking quantum hashing. Protocols and their cryptanalysis
- Quantum security of NMAC and related constructions. PRF domain extension against quantum attacks
Cites work
- scientific article; zbMATH DE number 1579275 (Why is no real title available?)
- scientific article; zbMATH DE number 1256737 (Why is no real title available?)
- scientific article; zbMATH DE number 2086719 (Why is no real title available?)
- Attacks on beyond-birthday-bound MACs in the quantum setting
- Beyond quadratic speedups in quantum attacks on symmetric schemes
- Blockcipher-based MACs: beyond the birthday bound without message length
- Breaking symmetric cryptosystems using quantum period finding
- Full PRF-secure message authentication code based on tweakable block cipher
- GIFT: a small present. Towards reaching the limit of lightweight encryption
- Generic attacks against beyond-birthday-bound MACs
- Grover meets Simon -- quantumly attacking the FX-construction
- How to build optimally secure PRFs using block ciphers
- Improved BV-based quantum attack on block ciphers
- OMAC: one-key CBC MAC.
- On the Power of Quantum Computation
- PMAC with parity: minimizing the query-length influence
- PRESENT: An Ultra-Lightweight Block Cipher
- Parallelizable MACs based on the sum of PRPs with security beyond the birthday bound
- Probability distributions of correlation and differentials in block ciphers
- Progress in Cryptology - INDOCRYPT 2004
- Quantum Complexity Theory
- Quantum algorithms for anomaly detection using amplitude estimation
- Quantum attacks on some Feistel block ciphers
- Quantum data compression by principal component analysis
- Quantum discriminant analysis for dimensionality reduction and classification
- Quantum linearization attacks
- Quantum-secure message authentication codes
- Secure signatures and chosen ciphertext security in a quantum computing world
- The LED block cipher
- The security of the cipher block chaining message authentication code
- The sum of CBC MACs is a secure PRF
- Tight bounds for Simon's algorithm
- Tight security bounds for double-block hash-then-sum MACs
- Using Bernstein-Vazirani algorithm to attack block ciphers
- Using an Error-Correction Code for Fast, Beyond-Birthday-Bound Authentication
This page was built for publication: Quantum attacks on beyond-birthday-bound MACs
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6167739)