Quantum attacks on some Feistel block ciphers. Des Codes Cryptogr. 2020;88(6):1179–203. Article MathSciNet Google Scholar Chen H, Li Y, Abla P, et al.. In: Quantum algorithm for finding impossible differenti
Quantum Attacks on Some Feistel Block Ciphers.Xiaoyang DongBingyou DongXiaoyun WangDong, X., Dong, B., Wang, X.: Quantum attacks on some Feistel block ciphers. IACR Cryptology ePrint Archive 2018, 504 (2018), https://eprint.iacr.org/ 2018/504...
https://doi.org/10.1155/2018/5160237 Dong X, Dong B, Wang X (2020a) Quantum attacks on some feistel block ciphers. Designs. Codes Crypt 88:1–25 Dong X, Sun S, Shi D, Gao F, Wang X, Hu L (2020b) Quantum collision attacks on aes-like hashing with low quantum random access ...
The quantum security of lightweight block ciphers is receiving more and more attention. However, the existing quantum attacks on lightweight block ciphers only focused on the quantum exhaustive search, while the quantum attacks combined with classical cryptanalysis methods haven’t been well studied. I...
Recent research has demonstrated the potential of quantum algorithms to exploit vulnerabilities in various popular constructions, such as certain block ciphers like Feistel, Even-Mansour, and multiple MACs, within the superposition query model. In this s
· The Feistel Function 2.8.2 Asymmetric Algorithms 2.8.3 Hybrid Cryptosystems 2.9 Security 2.9.1 Computational Complexity 2.9.2 Successful Attacks 3 Quantum Cryptography 3.1 Introduction 3.2 Quantum Mechanical Background 3.2.1 Qubits · Practical Realization of Qubit States ...
attacks, the corresponding quantum oracle of the target cipher has to be implemented. Due to the importance of AES, it is one of the most studied ciphers [3,11,15,17,18] in the context of efficient synthesis of quantum circuits. These implementations can be potentially used in some quantum...
Kaplan, M.: Quantum attacks against iterated block ciphers. CoRR abs/1410.1434 (2014) Google Scholar Kaplan, M., Leurent, G., Leverrier, A., Naya-Plasencia, M.: Breaking symmetric cryptosystems using quantum period finding. In: Robshaw, M., Katz, J. (eds.) CRYPTO 2016. LNCS, vol...
Besides, we find two new applications for this kind of BV-based attack, i.e., related-key attacks on iterated Even鈥揗ansour ciphers and i-round Feistel ciphers with independent round keys.doi:10.1007/s11128-022-03752-xSun Hong-Wei
Besides, we find two new applications for this kind of BV-based attack, i.e., related-key attacks on iterated Even鈥揗ansour ciphers andi-round Feistel ciphers with independent round keys.Hong-Wei Sungrid.31880.320000 0000 8780 1230State Key Laboratory of Networking and Switching Technology...