Pages that link to "Item:Q2849406"
From MaRDI portal
The following pages link to Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World (Q2849406):
Displaying 32 items.
- Cryptanalysis and improvement of verifiable quantum \((k,n)\) secret sharing (Q264629) (← links)
- Noisy Simon period finding (Q826245) (← links)
- Quantum cryptography beyond quantum key distribution (Q908054) (← links)
- Leighton-Micali hash-based signatures in the quantum random-oracle model (Q1746971) (← links)
- Breaking LWC candidates: sESTATE and Elephant in quantum setting (Q2035448) (← links)
- Quantum-access-secure message authentication via blind-unforgeability (Q2055681) (← links)
- Generic authenticated key exchange in the quantum random oracle model (Q2055699) (← links)
- QCCA-secure generic key encapsulation mechanism with tighter security in the quantum random oracle model (Q2061910) (← links)
- Improved BV-based quantum attack on block ciphers (Q2110996) (← links)
- Quantum indistinguishability for public key encryption (Q2118562) (← links)
- A new simple technique to bootstrap various lattice zero-knowledge proofs to QROM secure NIZKs (Q2128576) (← links)
- Quantum attacks on some Feistel block ciphers (Q2182081) (← links)
- Being a permutation is also orthogonal to one-wayness in quantum world: impossibilities of quantum one-way permutations from one-wayness primitives (Q2220875) (← links)
- Quantum spin half algebra and generalized Megrelishvili protocol for confidentiality of digital images (Q2239534) (← links)
- The magic of ELFs (Q2318089) (← links)
- Using Bernstein-Vazirani algorithm to attack block ciphers (Q2414939) (← links)
- Quantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptions (Q2661695) (← links)
- Complete analysis of Simon's quantum algorithm with additional collisions (Q2681014) (← links)
- A quantum related-key attack based on the Bernstein-Vazirani algorithm (Q2681588) (← links)
- Applications of Simon's algorithm in quantum attacks on Feistel variants (Q2687219) (← links)
- Post-quantum resettably-sound zero knowledge (Q2695624) (← links)
- Relationships between quantum IND-CPA notions (Q2695636) (← links)
- Breaking Symmetric Cryptosystems Using Quantum Period Finding (Q2829216) (← links)
- Semantic Security and Indistinguishability in the Quantum World (Q2829943) (← links)
- The Magic of ELFs (Q2835598) (← links)
- Computational Security of Quantum Encryption (Q2953808) (← links)
- Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms (Q3181027) (← links)
- Post-quantum Security of Plain OAEP Transform (Q5087248) (← links)
- On Quantum Chosen-Ciphertext Attacks and Learning with Errors (Q5089145) (← links)
- A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies (Q5854432) (← links)
- Dispelling myths on superposition attacks: formal security model and attack analyses (Q5918646) (← links)
- Quantum attacks on beyond-birthday-bound MACs (Q6167739) (← links)