ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1108.6313
  4. Cited By
Superposition Attacks on Cryptographic Protocols

Superposition Attacks on Cryptographic Protocols

31 August 2011
I. Damgård
Jakob Funder
J. Nielsen
L. Salvail
ArXiv (abs)PDFHTML

Papers citing "Superposition Attacks on Cryptographic Protocols"

19 / 19 papers shown
Title
A Note on the Post-Quantum Security of (Ring) Signatures
A Note on the Post-Quantum Security of (Ring) Signatures
Rohit Chatterjee
Kai-Min Chung
Xiao Liang
Giulio Malavolta
46
9
0
11 Dec 2021
Dispelling Myths on Superposition Attacks: Formal Security Model and
  Attack Analyses
Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses
Luka Music
Céline Chevalier
E. Kashefi
35
1
0
01 Jul 2020
Quantum Indistinguishability for Public Key Encryption
Quantum Indistinguishability for Public Key Encryption
Tommaso Gagliardoni
Juliane Krämer
Patrick Struck
57
11
0
01 Mar 2020
Quantum Physical Unclonable Functions: Possibilities and Impossibilities
Quantum Physical Unclonable Functions: Possibilities and Impossibilities
Myrto Arapinis
M. Delavar
Mina Doosti
E. Kashefi
51
51
0
04 Oct 2019
A quantum related-key attack based on Bernstein-Vazirani algorithm
A quantum related-key attack based on Bernstein-Vazirani algorithm
Huiqin Xie
Li Yang
37
11
0
09 Aug 2018
Quantum Lightning Never Strikes the Same State Twice
Quantum Lightning Never Strikes the Same State Twice
Mark Zhandry
77
99
0
07 Nov 2017
Using Bernstein-Vazirani Algorithm to Attack Block Ciphers
Using Bernstein-Vazirani Algorithm to Attack Block Ciphers
Huiqin Xie
Li Yang
59
45
0
02 Nov 2017
Quantum Security of Cryptographic Primitives
Quantum Security of Cryptographic Primitives
Tommaso Gagliardoni
69
25
0
05 May 2017
A Note on Quantum-Secure PRPs
A Note on Quantum-Secure PRPs
Mark Zhandry
115
43
0
17 Nov 2016
Privacy Amplification Against Active Quantum Adversaries
Gil Cohen
Thomas Vidick
35
4
0
22 Aug 2016
New security notions and feasibility results for authentication of
  quantum data
New security notions and feasibility results for authentication of quantum data
Sumegha Garg
H. Yuen
Mark Zhandry
87
49
0
26 Jul 2016
Security Protocols in a Nutshell
Security Protocols in a Nutshell
Mohsen Toorani
31
1
0
31 May 2016
Breaking Symmetric Cryptosystems using Quantum Period Finding
Breaking Symmetric Cryptosystems using Quantum Period Finding
M. Kaplan
G. Leurent
Anthony Leverrier
M. Naya-Plasencia
91
305
0
18 Feb 2016
Quantum Oracle Classification - The Case of Group Structure
Quantum Oracle Classification - The Case of Group Structure
Mark Zhandry
35
6
0
28 Oct 2015
Quantum Differential and Linear Cryptanalysis
Quantum Differential and Linear Cryptanalysis
M. Kaplan
G. Leurent
Anthony Leverrier
M. Naya-Plasencia
89
142
0
20 Oct 2015
Semantic Security and Indistinguishability in the Quantum World
Semantic Security and Indistinguishability in the Quantum World
Tommaso Gagliardoni
Andreas Hülsing
Christian Schaffner
109
83
0
20 Apr 2015
Quantum Attacks on Classical Proof Systems - The Hardness of Quantum
  Rewinding
Quantum Attacks on Classical Proof Systems - The Hardness of Quantum Rewinding
A. Ambainis
A. Rosmanis
Dominique Unruh
82
161
0
28 Apr 2014
Classical Encryption and Authentication under Quantum Attacks
Classical Encryption and Authentication under Quantum Attacks
M. Velema
62
5
0
14 Jul 2013
The Fiat-Shamir Transformation in a Quantum World
The Fiat-Shamir Transformation in a Quantum World
Özgür Dagdelen
Tommaso Gagliardoni
93
56
0
03 Jun 2013
1