Quantum analysis of AES
Quantum computing is considered among the next big leaps in computer science. While a
fully functional quantum computer is still in the future, there is an ever-growing need to …
fully functional quantum computer is still in the future, there is an ever-growing need to …
Quantum encryption with quantum permutation pad in IBMQ systems
R Kuang, M Perepechaenko - EPJ Quantum Technology, 2022 - epjqt.epj.org
Quantum permutation pad or QPP is a quantum-safe symmetric cryptographic algorithm
proposed by Kuang and Bettenburg in 2020. The theoretical foundation of QPP leverages …
proposed by Kuang and Bettenburg in 2020. The theoretical foundation of QPP leverages …
Quantum implementation and resource estimates for rectangle and knot
With the advancement of the quantum computing technologies, a large body of research
work is dedicated to revisit the security claims for ciphers being used. An adversary with …
work is dedicated to revisit the security claims for ciphers being used. An adversary with …
Quantum implementation and analysis of default
In this paper, we present the quantum implementation and analysis of the recently proposed
block cipher, DEFAULT. This cipher consists of two components, namely DEFAULT-LAYER …
block cipher, DEFAULT. This cipher consists of two components, namely DEFAULT-LAYER …
Efficient implementation of lightweight hash functions on GPU and quantum computers for IoT applications
Secure communication is important for Internet of Things (IoT) applications, to avoid cyber-
security attacks. One of the key security aspects is data integrity, which can be protected by …
security attacks. One of the key security aspects is data integrity, which can be protected by …
Implementing Grover's on AES-based AEAD schemes
Extensive research is currently underway to determine the security of existing ciphers in light
of the advancements in quantum computing. Against symmetric key cryptography, Grover's …
of the advancements in quantum computing. Against symmetric key cryptography, Grover's …
Dorcis: depth optimized quantum implementation of substitution boxes
M Chun, A Baksi, A Chattopadhyay - Cryptology ePrint Archive, 2023 - eprint.iacr.org
In this paper, we present the``DORCIS''tool, which finds depth-optimized quantum circuit
implementations for arbitrary 3-and 4-bit S-boxes. It follows up from the previous LIGHTER-R …
implementations for arbitrary 3-and 4-bit S-boxes. It follows up from the previous LIGHTER-R …
Improved low-depth SHA3 quantum circuit for fault-tolerant quantum computers
To build a secure cryptography system in the post-quantum era, one must find the minimum
security parameters against quantum attacks by estimating the quantum resources of a fault …
security parameters against quantum attacks by estimating the quantum resources of a fault …
Quantum security analysis of Rocca
The recent developments in the creation of large-scale, commercially feasible quantum
computers puts both symmetric and asymmetric encryption at risk. As they assess the …
computers puts both symmetric and asymmetric encryption at risk. As they assess the …
Improved quantum analysis of SPECK and lowmc
As the prevalence of quantum computing is growing in leaps and bounds over the past few
years, there is an ever-growing need to analyze the symmetric-key ciphers against the …
years, there is an ever-growing need to analyze the symmetric-key ciphers against the …