Quantum analysis of AES

K Jang, A Baksi, H Kim, G Song, H Seo… - Cryptology ePrint …, 2022 - eprint.iacr.org
Quantum computing is considered among the next big leaps in computer science. While a
fully functional quantum computer is still in the future, there is an ever-growing need to …

Synthesizing Quantum Circuits of AES with Lower T-depth and Less Qubits

Z Huang, S Sun - International Conference on the Theory and …, 2022 - Springer
The significant progress in the development of quantum computers has made the study of
cryptanalysis based on quantum computing an active topic. To accurately estimate the …

Quantum algorithms for attacking hardness assumptions in classical and post‐quantum cryptography

JF Biasse, X Bonnetain, E Kirshanova… - IET Information …, 2023 - Wiley Online Library
In this survey, the authors review the main quantum algorithms for solving the computational
problems that serve as hardness assumptions for cryptosystem. To this end, the authors …

Quantum cryptanalytic attacks of symmetric ciphers: A review

AK Malviya, N Tiwari, M Chawla - Computers and Electrical Engineering, 2022 - Elsevier
A review of several latest quantum cryptanalysis techniques of symmetric cryptography is
covered. Primarily, the design theory of the quantum cryptanalysis approach is explained …

Revisiting higher-order differential-linear attacks from an algebraic perspective

K Hu, T Peyrin, QQ Tan, T Yap - … Conference on the Theory and Application …, 2023 - Springer
Abstract The Higher-order Differential-Linear (HDL) attack was introduced by Biham et al. at
FSE 2005, where a linear approximation was appended to a Higher-order Differential (HD) …

QCB: efficient quantum-secure authenticated encryption

R Bhaumik, X Bonnetain, A Chailloux… - Advances in Cryptology …, 2021 - Springer
It was long thought that symmetric cryptography was only mildly affected by quantum attacks,
and that doubling the key length was sufficient to restore security. However, recent works …

Attribute-based encryption in securing big data from post-quantum perspective: a survey

ZB Jemihin, SF Tan, GC Chung - Cryptography, 2022 - mdpi.com
Attribute-based encryption (ABE) cryptography is widely known for its potential to solve the
scalability issue of recent public key infrastructure (PKI). It provides a fine-grained access …

A post-quantum secure subscription concealed identifier for 6G

VQ Ulitzsch, S Park, S Marzougui… - Proceedings of the 15th …, 2022 - dl.acm.org
5G saw the introduction of an encrypted user identifier, the Subscriber Concealed Identifier
(SUCI), to provide confidentiality of the subscriber's whereabouts and identities. The SUCI …

On the quantum security of OCB

V Maram, D Masny, S Patranabis… - IACR Transactions …, 2022 - research-collection.ethz.ch
The OCB mode of operation for block ciphers has three variants, OCB1, OCB2 and OCB3.
OCB1 and OCB3 can be used as secure authenticated encryption schemes whereas OCB2 …

Optimizing the depth of quantum implementations of linear layers

C Zhu, Z Huang - International Conference on Information Security and …, 2022 - Springer
Synthesis and optimization of quantum circuits are important and fundamental research
topics in quantum computation, due to the fact that qubits are very precious and …