ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1108.6313
  4. Cited By
Superposition Attacks on Cryptographic Protocols

Superposition Attacks on Cryptographic Protocols

31 August 2011
I. Damgård
Jakob Funder
J. Nielsen
L. Salvail
ArXiv (abs)PDFHTML

Papers citing "Superposition Attacks on Cryptographic Protocols"

19 / 19 papers shown
A Note on the Post-Quantum Security of (Ring) Signatures
A Note on the Post-Quantum Security of (Ring) Signatures
Rohit Chatterjee
Kai-Min Chung
Xiao Liang
Giulio Malavolta
162
11
0
11 Dec 2021
Dispelling Myths on Superposition Attacks: Formal Security Model and
  Attack Analyses
Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses
Luka Music
Céline Chevalier
E. Kashefi
169
1
0
01 Jul 2020
Quantum Indistinguishability for Public Key Encryption
Quantum Indistinguishability for Public Key EncryptionIACR Cryptology ePrint Archive (IACR ePrint), 2020
Tommaso Gagliardoni
Juliane Krämer
Patrick Struck
434
11
0
01 Mar 2020
Quantum Physical Unclonable Functions: Possibilities and Impossibilities
Quantum Physical Unclonable Functions: Possibilities and ImpossibilitiesIACR Cryptology ePrint Archive (IACR ePrint), 2019
Myrto Arapinis
M. Delavar
Mina Doosti
E. Kashefi
353
68
0
04 Oct 2019
A quantum related-key attack based on Bernstein-Vazirani algorithm
A quantum related-key attack based on Bernstein-Vazirani algorithm
Huiqin Xie
Li Yang
213
17
0
09 Aug 2018
Quantum Lightning Never Strikes the Same State Twice
Quantum Lightning Never Strikes the Same State Twice
Mark Zhandry
281
107
0
07 Nov 2017
Using Bernstein-Vazirani Algorithm to Attack Block Ciphers
Using Bernstein-Vazirani Algorithm to Attack Block Ciphers
Huiqin Xie
Li Yang
245
51
0
02 Nov 2017
Quantum Security of Cryptographic Primitives
Quantum Security of Cryptographic Primitives
Tommaso Gagliardoni
198
25
0
05 May 2017
A Note on Quantum-Secure PRPs
A Note on Quantum-Secure PRPs
Mark Zhandry
390
49
0
17 Nov 2016
Privacy Amplification Against Active Quantum Adversaries
Gil Cohen
Thomas Vidick
204
4
0
22 Aug 2016
New security notions and feasibility results for authentication of
  quantum data
New security notions and feasibility results for authentication of quantum data
Sumegha Garg
H. Yuen
Mark Zhandry
208
53
0
26 Jul 2016
Security Protocols in a Nutshell
Security Protocols in a Nutshell
Mohsen Toorani
143
1
0
31 May 2016
Breaking Symmetric Cryptosystems using Quantum Period Finding
Breaking Symmetric Cryptosystems using Quantum Period Finding
M. Kaplan
G. Leurent
Anthony Leverrier
M. Naya-Plasencia
369
333
0
18 Feb 2016
Quantum Oracle Classification - The Case of Group Structure
Quantum Oracle Classification - The Case of Group Structure
Mark Zhandry
150
7
0
28 Oct 2015
Quantum Differential and Linear Cryptanalysis
Quantum Differential and Linear Cryptanalysis
M. Kaplan
G. Leurent
Anthony Leverrier
M. Naya-Plasencia
341
152
0
20 Oct 2015
Semantic Security and Indistinguishability in the Quantum World
Semantic Security and Indistinguishability in the Quantum World
Tommaso Gagliardoni
Andreas Hülsing
Christian Schaffner
339
84
0
20 Apr 2015
Quantum Attacks on Classical Proof Systems - The Hardness of Quantum
  Rewinding
Quantum Attacks on Classical Proof Systems - The Hardness of Quantum RewindingIEEE Annual Symposium on Foundations of Computer Science (FOCS), 2014
A. Ambainis
A. Rosmanis
Dominique Unruh
211
169
0
28 Apr 2014
Classical Encryption and Authentication under Quantum Attacks
Classical Encryption and Authentication under Quantum Attacks
M. Velema
161
6
0
14 Jul 2013
The Fiat-Shamir Transformation in a Quantum World
The Fiat-Shamir Transformation in a Quantum WorldIACR Cryptology ePrint Archive (IACR ePrint), 2013
Özgür Dagdelen
Tommaso Gagliardoni
250
57
0
03 Jun 2013
1
Page 1 of 1