ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1602.05973
  4. Cited By
Breaking Symmetric Cryptosystems using Quantum Period Finding
v1v2v3 (latest)

Breaking Symmetric Cryptosystems using Quantum Period Finding

18 February 2016
M. Kaplan
G. Leurent
Anthony Leverrier
M. Naya-Plasencia
ArXiv (abs)PDFHTML

Papers citing "Breaking Symmetric Cryptosystems using Quantum Period Finding"

32 / 32 papers shown
Title
Noise-Tolerant Quantum Tokens for MAC
Noise-Tolerant Quantum Tokens for MAC
Amit Behera
Or Sattath
Uriel Shinar
117
10
0
28 Jan 2025
Post-Quantum Cryptography for Internet of Things: A Survey on
  Performance and Optimization
Post-Quantum Cryptography for Internet of Things: A Survey on Performance and Optimization
Tao Liu
Gowri Ramachandran
Raja Jurdak
61
19
0
31 Jan 2024
Learning Quantum Processes with Quantum Statistical Queries
Learning Quantum Processes with Quantum Statistical Queries
Chirag Wadhwa
Mina Doosti
162
3
0
03 Oct 2023
Quantum Searchable Encryption for Cloud Data Based on Full-Blind Quantum
  Computation
Quantum Searchable Encryption for Cloud Data Based on Full-Blind Quantum Computation
Wenjie Liu
Yinsong Xu
Wenjie Liu
Haibin Wang
Zhibin Lei
FedML
38
10
0
24 Sep 2023
Quantum All-Subkeys-Recovery Attacks on 6-round Feistel-2* Structure
  Based on Multi-Equations Quantum Claw Finding
Quantum All-Subkeys-Recovery Attacks on 6-round Feistel-2* Structure Based on Multi-Equations Quantum Claw Finding
Wenjie Liu
Mengting Wang
Zi-Xi Li
25
6
0
24 Sep 2023
Quantum forgery attacks on COPA,AES-COPA and marble authenticated
  encryption algorithms
Quantum forgery attacks on COPA,AES-COPA and marble authenticated encryption algorithms
Yinsong Xu
Wenjie Liu
Wenbin Yu
37
17
0
23 Sep 2023
Quantum Circuit Implementation and Resource Analysis of LBlock and LiCi
Quantum Circuit Implementation and Resource Analysis of LBlock and LiCi
Xiaoyu Jing
Yanjun Li
Guangyue Zhao
Huiqin Xie
18
3
0
02 May 2023
Beyond quadratic speedups in quantum attacks on symmetric schemes
Beyond quadratic speedups in quantum attacks on symmetric schemes
X. Bonnetain
André Schrottenloher
Ferdinand Sibleyras
45
28
0
06 Oct 2021
Quantum collision finding for homomorphic hash functions
Quantum collision finding for homomorphic hash functions
J. C. García-Escartín
V. Gimeno
Julio José Moyano-Fernández
13
4
0
30 Jul 2021
A Unified Framework For Quantum Unforgeability
A Unified Framework For Quantum Unforgeability
Mina Doosti
M. Delavar
E. Kashefi
Myrto Arapinis
42
10
0
25 Mar 2021
Quantum-access security of the Winternitz one-time signature scheme
Quantum-access security of the Winternitz one-time signature scheme
Christian Majenz
Chanelle Matadah Manfouo
M. Ozols
63
6
0
23 Mar 2021
Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
  Post-Quantum Security
Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's Post-Quantum Security
Alexandru Cojocaru
J. Garay
A. Kiayias
F. Song
P. Wallden
53
4
0
30 Dec 2020
Quantum Period Finding against Symmetric Primitives in Practice
Quantum Period Finding against Symmetric Primitives in Practice
X. Bonnetain
Samuel Jaques
34
32
0
13 Nov 2020
Quantum Search for Scaled Hash Function Preimages
Quantum Search for Scaled Hash Function Preimages
Sergi Ramos-Calderer
E. Bellini
J. Latorre
Marcos Manzano
Víctor Mateu
23
20
0
01 Sep 2020
In-place implementation of Quantum-Gimli
In-place implementation of Quantum-Gimli
Lars Schlieper
41
8
0
13 Jul 2020
Dispelling Myths on Superposition Attacks: Formal Security Model and
  Attack Analyses
Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses
Luka Music
Céline Chevalier
E. Kashefi
30
1
0
01 Jul 2020
Quantum Attacks without Superposition Queries: the Offline Simon's
  Algorithm
Quantum Attacks without Superposition Queries: the Offline Simon's Algorithm
X. Bonnetain
Akinori Hosoyamada
M. Naya-Plasencia
Yu Sasaki
André Schrottenloher
39
99
0
27 Feb 2020
General Linear Group Action on Tensors: A Candidate for Post-Quantum
  Cryptography
General Linear Group Action on Tensors: A Candidate for Post-Quantum Cryptography
Zhengfeng Ji
Youming Qiao
F. Song
Aaram Yun
51
46
0
11 Jun 2019
Quantum Period Finding is Compression Robust
Quantum Period Finding is Compression Robust
Alexander May
Lars Schlieper
MQ
32
2
0
24 May 2019
Quantum security of hash functions and property-preservation of iterated
  hashing
Quantum security of hash functions and property-preservation of iterated hashing
Benjamin J Hamlin
F. Song
33
10
0
23 Feb 2019
On Quantum Chosen-Ciphertext Attacks and Learning with Errors
On Quantum Chosen-Ciphertext Attacks and Learning with Errors
G. Alagic
S. Jeffery
M. Ozols
Alexander Poremba
67
13
0
29 Aug 2018
A quantum related-key attack based on Bernstein-Vazirani algorithm
A quantum related-key attack based on Bernstein-Vazirani algorithm
Huiqin Xie
Li Yang
34
11
0
09 Aug 2018
Quantum-secure message authentication via blind-unforgeability
Quantum-secure message authentication via blind-unforgeability
G. Alagic
Christian Majenz
Alexander Russell
F. Song
56
40
0
10 Mar 2018
Quantum impossible differential and truncated differential cryptanalysis
Quantum impossible differential and truncated differential cryptanalysis
Huiqin Xie
Li Yang
31
4
0
18 Dec 2017
Using Bernstein-Vazirani Algorithm to Attack Block Ciphers
Using Bernstein-Vazirani Algorithm to Attack Block Ciphers
Huiqin Xie
Li Yang
50
45
0
02 Nov 2017
How to Generate Pseudorandom Permutations Over Other Groups
How to Generate Pseudorandom Permutations Over Other Groups
Hector B. Hougaard
121
1
0
16 Oct 2017
Quantum Security of Cryptographic Primitives
Quantum Security of Cryptographic Primitives
Tommaso Gagliardoni
66
25
0
05 May 2017
A Note on Quantum-Secure PRPs
A Note on Quantum-Secure PRPs
Mark Zhandry
110
43
0
17 Nov 2016
Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts
Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts
G. Alagic
Alexander Russell
134
44
0
04 Oct 2016
New security notions and feasibility results for authentication of
  quantum data
New security notions and feasibility results for authentication of quantum data
Sumegha Garg
H. Yuen
Mark Zhandry
74
49
0
26 Jul 2016
Quantum Differential and Linear Cryptanalysis
Quantum Differential and Linear Cryptanalysis
M. Kaplan
G. Leurent
Anthony Leverrier
M. Naya-Plasencia
77
142
0
20 Oct 2015
Semantic Security and Indistinguishability in the Quantum World
Semantic Security and Indistinguishability in the Quantum World
Tommaso Gagliardoni
Andreas Hülsing
Christian Schaffner
93
83
0
20 Apr 2015
1