Quantum analysis of AES

K Jang, A Baksi, H Kim, G Song, H Seo… - Cryptology ePrint …, 2022 - eprint.iacr.org
Quantum computing is considered among the next big leaps in computer science. While a
fully functional quantum computer is still in the future, there is an ever-growing need to …

Quantum encryption with quantum permutation pad in IBMQ systems

R Kuang, M Perepechaenko - EPJ Quantum Technology, 2022 - epjqt.epj.org
Quantum permutation pad or QPP is a quantum-safe symmetric cryptographic algorithm
proposed by Kuang and Bettenburg in 2020. The theoretical foundation of QPP leverages …

Quantum implementation and analysis of default

K Jang, A Baksi, J Breier, H Seo… - Cryptography and …, 2023 - Springer
In this paper, we present the quantum implementation and analysis of the recently proposed
block cipher, DEFAULT. This cipher consists of two components, namely DEFAULT-LAYER …

Efficient implementation of lightweight hash functions on GPU and quantum computers for IoT applications

WK Lee, K Jang, G Song, H Kim, SO Hwang… - IEEE Access, 2022 - ieeexplore.ieee.org
Secure communication is important for Internet of Things (IoT) applications, to avoid cyber-
security attacks. One of the key security aspects is data integrity, which can be protected by …

Implementing Grover's on AES-based AEAD schemes

S Mandal, R Anand, M Rahman, S Sarkar, T Isobe - Scientific Reports, 2024 - nature.com
Extensive research is currently underway to determine the security of existing ciphers in light
of the advancements in quantum computing. Against symmetric key cryptography, Grover's …

[PDF][PDF] Quantum implementation of ASCON linear layer

S Roy, A Baksi, A Chattopadhyay - Cryptology ePrint Archive, 2023 - core.ac.uk
In this paper, we show an in-place implementation of the ASCON linear layer. An in-place
implementation is important in the context of quantum computing, we expect our work will be …

SPEEDY quantum circuit for Grover's algorithm

G Song, K Jang, H Kim, S Eum, M Sim, H Kim, W Lee… - Applied Sciences, 2022 - mdpi.com
In this paper, we propose a quantum circuit for the SPEEDY block cipher for the first time and
estimate its security strength based on the post-quantum security strength presented by …

Optimized implementation and analysis of cham in quantum computing

Y Yang, K Jang, A Baksi, H Seo - Applied Sciences, 2023 - mdpi.com
A quantum computer capable of running the Grover search algorithm, which reduces the
complexity of brute-force attacks by a square root, has the potential to undermine the …

Dorcis: depth optimized quantum implementation of substitution boxes

M Chun, A Baksi, A Chattopadhyay - Cryptology ePrint Archive, 2023 - eprint.iacr.org
In this paper, we present the``DORCIS''tool, which finds depth-optimized quantum circuit
implementations for arbitrary 3-and 4-bit S-boxes. It follows up from the previous LIGHTER-R …

Improved low-depth SHA3 quantum circuit for fault-tolerant quantum computers

G Song, K Jang, H Seo - Applied Sciences, 2023 - mdpi.com
To build a secure cryptography system in the post-quantum era, one must find the minimum
security parameters against quantum attacks by estimating the quantum resources of a fault …