On quantum slide attacks
From MaRDI portal
Publication:778947
DOI10.1007/978-3-030-38471-5_20zbMATH Open1453.94062OpenAlexW2949204091MaRDI QIDQ778947FDOQ778947
Authors: Xavier Bonnetain, María Naya-Plasencia, André Schrottenloher
Publication date: 21 July 2020
Full work available at URL: https://doi.org/10.1007/978-3-030-38471-5_20
Recommendations
- Breaking symmetric cryptosystems using quantum period finding
- Quantum attacks on some Feistel block ciphers
- Quantum attacks without superposition queries: the offline Simon's algorithm
- On quantum related-key attacks on iterated Even-Mansour ciphers
- Quantum chosen-ciphertext attacks against Feistel ciphers
quantum cryptanalysisFeistel networksslide attackscycle findingKuperberg's algorithmSimon's algorithmslidex attacks
Cited In (36)
- Quantum generic attacks on key-alternating Feistel ciphers for shorter keys
- Quantum meet-in-the-middle attack on Feistel construction
- Quantum attacks against type-1 generalized Feistel ciphers and applications to CAST-256
- Quantum search for scaled hash function preimages
- Quantum linearization attacks
- On quantum ciphertext indistinguishability, recoverability, and OAEP
- Concrete analysis of quantum lattice enumeration
- On quantum secure compressing pseudorandom functions
- Quantum attacks on hash constructions with low quantum random access memory
- Quantum speed-up for multidimensional (zero correlation) linear distinguishers
- Quantum forgery attacks on COPA, AES-COPA and marble authenticated encryption algorithms
- Synthesizing quantum circuits of AES with lower \(T\)-depth and less qubits
- Lifting standard model reductions to common setup assumptions
- Quantum attacks on some Feistel block ciphers
- Beyond quadratic speedups in quantum attacks on symmetric schemes
- Quantum cryptanalysis on contracting Feistel structures and observation on related-key settings
- Breaking LWC candidates: sESTATE and Elephant in quantum setting
- Quantum boomerang attacks and some applications
- Optimizing the depth of quantum implementations of linear layers
- New results on quantum boomerang attacks
- Quantum linear key-recovery attacks using the QFT
- A quantum distinguisher for 7/8-round SMS4 block cipher
- On Quantum Distinguishers for Type-3 Generalized Feistel Network Based on Separability
- Triangulating rebound attack on AES-like hashing
- Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound
- Quantum Key Recovery Attacks on 3-Round Feistel-2 Structure Without Quantum Encryption Oracles
- Characterizing the qIND-qCPA (In)security of the CBC, CFB, OFB and CTR Modes of Operation
- Tight bounds for Simon's algorithm
- Applications of Simon's algorithm in quantum attacks on Feistel variants
- Quantum collision attacks on AES-like hashing with low quantum random access memories
- QCB: efficient quantum-secure authenticated encryption
- Quantum all-subkeys-recovery attacks on 6-round Feistel-\(2^\ast\) structure based on multi-equations quantum claw finding
- Quantum key recovery attacks on tweakable Even-Mansour ciphers
- Ghidle: efficient large-state block ciphers for post-quantum security
- Quantum algorithm for finding impossible differentials and zero-correlation linear hulls of symmetric ciphers
- Quantum impossible differential attacks: applications to AES and SKINNY
This page was built for publication: On quantum slide attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q778947)