Quantum analysis of AES
Quantum computing is considered among the next big leaps in computer science. While a
fully functional quantum computer is still in the future, there is an ever-growing need to …
fully functional quantum computer is still in the future, there is an ever-growing need to …
Synthesizing Quantum Circuits of AES with Lower T-depth and Less Qubits
The significant progress in the development of quantum computers has made the study of
cryptanalysis based on quantum computing an active topic. To accurately estimate the …
cryptanalysis based on quantum computing an active topic. To accurately estimate the …
Quantum algorithms for attacking hardness assumptions in classical and post‐quantum cryptography
In this survey, the authors review the main quantum algorithms for solving the computational
problems that serve as hardness assumptions for cryptosystem. To this end, the authors …
problems that serve as hardness assumptions for cryptosystem. To this end, the authors …
Quantum cryptanalytic attacks of symmetric ciphers: A review
A review of several latest quantum cryptanalysis techniques of symmetric cryptography is
covered. Primarily, the design theory of the quantum cryptanalysis approach is explained …
covered. Primarily, the design theory of the quantum cryptanalysis approach is explained …
Revisiting higher-order differential-linear attacks from an algebraic perspective
Abstract The Higher-order Differential-Linear (HDL) attack was introduced by Biham et al. at
FSE 2005, where a linear approximation was appended to a Higher-order Differential (HD) …
FSE 2005, where a linear approximation was appended to a Higher-order Differential (HD) …
QCB: efficient quantum-secure authenticated encryption
It was long thought that symmetric cryptography was only mildly affected by quantum attacks,
and that doubling the key length was sufficient to restore security. However, recent works …
and that doubling the key length was sufficient to restore security. However, recent works …
Attribute-based encryption in securing big data from post-quantum perspective: a survey
Attribute-based encryption (ABE) cryptography is widely known for its potential to solve the
scalability issue of recent public key infrastructure (PKI). It provides a fine-grained access …
scalability issue of recent public key infrastructure (PKI). It provides a fine-grained access …
A post-quantum secure subscription concealed identifier for 6G
5G saw the introduction of an encrypted user identifier, the Subscriber Concealed Identifier
(SUCI), to provide confidentiality of the subscriber's whereabouts and identities. The SUCI …
(SUCI), to provide confidentiality of the subscriber's whereabouts and identities. The SUCI …
On the quantum security of OCB
The OCB mode of operation for block ciphers has three variants, OCB1, OCB2 and OCB3.
OCB1 and OCB3 can be used as secure authenticated encryption schemes whereas OCB2 …
OCB1 and OCB3 can be used as secure authenticated encryption schemes whereas OCB2 …
Optimizing the depth of quantum implementations of linear layers
Synthesis and optimization of quantum circuits are important and fundamental research
topics in quantum computation, due to the fact that qubits are very precious and …
topics in quantum computation, due to the fact that qubits are very precious and …