Quantum analysis of AES
Quantum computing is considered among the next big leaps in computer science. While a
fully functional quantum computer is still in the future, there is an ever-growing need to …
fully functional quantum computer is still in the future, there is an ever-growing need to …
New quantum circuit implementations of SM4 and SM3
J Zou, L Li, Z Wei, Y Luo, Q Liu, W Wu - Quantum Information Processing, 2022 - Springer
In this paper, we propose some new quantum circuit implementations of SM4 block cipher
and SM3 hash function, which are based on the following ideas. Firstly, we propose an …
and SM3 hash function, which are based on the following ideas. Firstly, we propose an …
SPEEDY quantum circuit for Grover's algorithm
In this paper, we propose a quantum circuit for the SPEEDY block cipher for the first time and
estimate its security strength based on the post-quantum security strength presented by …
estimate its security strength based on the post-quantum security strength presented by …
Improved low-depth SHA3 quantum circuit for fault-tolerant quantum computers
To build a secure cryptography system in the post-quantum era, one must find the minimum
security parameters against quantum attacks by estimating the quantum resources of a fault …
security parameters against quantum attacks by estimating the quantum resources of a fault …
Improved quantum analysis of SPECK and lowmc
As the prevalence of quantum computing is growing in leaps and bounds over the past few
years, there is an ever-growing need to analyze the symmetric-key ciphers against the …
years, there is an ever-growing need to analyze the symmetric-key ciphers against the …
[HTML][HTML] Grover on Scrypt
This paper presents an optimized quantum circuit for the scrypt cryptographic algorithm. We
applied various optimization techniques to reduce the DW cost, which is the product of the …
applied various optimization techniques to reduce the DW cost, which is the product of the …
A CUDA-based parallel optimization method for SM3 hash algorithm
J Han, T Peng, X Zhang - The Journal of Supercomputing, 2024 - Springer
Hash algorithms are among the most crucial algorithms in cryptography. The SM3 algorithm
is a hash cryptographic standard of China. Because of the strong collision resistance and …
is a hash cryptographic standard of China. Because of the strong collision resistance and …
Optimized Quantum Circuit for Quantum Security Strength Analysis of Argon2
This paper explores the optimization of quantum circuits for Argon2, a memory-hard function
used in password hashing applications. With the rise of quantum computers, the security of …
used in password hashing applications. With the rise of quantum computers, the security of …
Designing Hash and Encryption Engines using Quantum Computing
Quantum computing (QC) holds the promise of revolutionizing problem-solving by exploiting
quantum phenomena like superposition and entanglement. It offers exponential speed-ups …
quantum phenomena like superposition and entanglement. It offers exponential speed-ups …
Comparative analysis of quantum circuit implementation for domestic and international hash functions
The advent of quantum computers threatens the security of existing hash functions. In this
paper, we confirmed the implementation results of quantum circuits for …
paper, we confirmed the implementation results of quantum circuits for …