Quantum analysis of AES
Quantum computing is considered among the next big leaps in computer science. While a
fully functional quantum computer is still in the future, there is an ever-growing need to …
fully functional quantum computer is still in the future, there is an ever-growing need to …
Quantum encryption with quantum permutation pad in IBMQ systems
R Kuang, M Perepechaenko - EPJ Quantum Technology, 2022 - epjqt.epj.org
Quantum permutation pad or QPP is a quantum-safe symmetric cryptographic algorithm
proposed by Kuang and Bettenburg in 2020. The theoretical foundation of QPP leverages …
proposed by Kuang and Bettenburg in 2020. The theoretical foundation of QPP leverages …
Quantum implementation and analysis of default
In this paper, we present the quantum implementation and analysis of the recently proposed
block cipher, DEFAULT. This cipher consists of two components, namely DEFAULT-LAYER …
block cipher, DEFAULT. This cipher consists of two components, namely DEFAULT-LAYER …
Efficient implementation of lightweight hash functions on GPU and quantum computers for IoT applications
Secure communication is important for Internet of Things (IoT) applications, to avoid cyber-
security attacks. One of the key security aspects is data integrity, which can be protected by …
security attacks. One of the key security aspects is data integrity, which can be protected by …
Implementing Grover's on AES-based AEAD schemes
Extensive research is currently underway to determine the security of existing ciphers in light
of the advancements in quantum computing. Against symmetric key cryptography, Grover's …
of the advancements in quantum computing. Against symmetric key cryptography, Grover's …
[PDF][PDF] Quantum implementation of ASCON linear layer
In this paper, we show an in-place implementation of the ASCON linear layer. An in-place
implementation is important in the context of quantum computing, we expect our work will be …
implementation is important in the context of quantum computing, we expect our work will be …
SPEEDY quantum circuit for Grover's algorithm
In this paper, we propose a quantum circuit for the SPEEDY block cipher for the first time and
estimate its security strength based on the post-quantum security strength presented by …
estimate its security strength based on the post-quantum security strength presented by …
Optimized implementation and analysis of cham in quantum computing
A quantum computer capable of running the Grover search algorithm, which reduces the
complexity of brute-force attacks by a square root, has the potential to undermine the …
complexity of brute-force attacks by a square root, has the potential to undermine the …
Dorcis: depth optimized quantum implementation of substitution boxes
In this paper, we present the``DORCIS''tool, which finds depth-optimized quantum circuit
implementations for arbitrary 3-and 4-bit S-boxes. It follows up from the previous LIGHTER-R …
implementations for arbitrary 3-and 4-bit S-boxes. It follows up from the previous LIGHTER-R …
Improved low-depth SHA3 quantum circuit for fault-tolerant quantum computers
To build a secure cryptography system in the post-quantum era, one must find the minimum
security parameters against quantum attacks by estimating the quantum resources of a fault …
security parameters against quantum attacks by estimating the quantum resources of a fault …