On quantum slide attacks

From MaRDI portal
Publication:778947

DOI10.1007/978-3-030-38471-5_20zbMath1453.94062OpenAlexW2949204091MaRDI QIDQ778947

André Schrottenloher, Xavier Bonnetain, María Naya-Plasencia

Publication date: 21 July 2020

Full work available at URL: https://doi.org/10.1007/978-3-030-38471-5_20




Related Items (27)

On Quantum Distinguishers for Type-3 Generalized Feistel Network Based on SeparabilityTight bounds for Simon's algorithmQuantum cryptanalysis on contracting Feistel structures and observation on related-key settingsBeyond quadratic speedups in quantum attacks on symmetric schemesQuantum attacks against type-1 generalized Feistel ciphers and applications to CAST-256Quantum attacks on some Feistel block ciphersNew results on quantum boomerang attacksQuantum meet-in-the-middle attack on Feistel constructionQuantum key recovery attacks on tweakable Even-Mansour ciphersTriangulating rebound attack on AES-like hashingQuantum impossible differential attacks: applications to AES and SKINNYA quantum distinguisher for 7/8-round SMS4 block cipherOptimizing the depth of quantum implementations of linear layersSynthesizing quantum circuits of AES with lower \(T\)-depth and less qubitsQuantum linearization attacksQCB: efficient quantum-secure authenticated encryptionApplications of Simon's algorithm in quantum attacks on Feistel variantsOn quantum ciphertext indistinguishability, recoverability, and OAEPLifting standard model reductions to common setup assumptionsQuantum linear key-recovery attacks using the QFTQuantum search for scaled hash function preimagesQuantum forgery attacks on COPA, AES-COPA and marble authenticated encryption algorithmsQuantum collision attacks on AES-like hashing with low quantum random access memoriesQuantum all-subkeys-recovery attacks on 6-round Feistel-\(2^\ast\) structure based on multi-equations quantum claw findingBreaking LWC candidates: sESTATE and Elephant in quantum settingQuantum generic attacks on key-alternating Feistel ciphers for shorter keysFinding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound




This page was built for publication: On quantum slide attacks