Securing IoT systems in a post-quantum environment: Vulnerabilities, attacks, and possible solutions
Abstract The Internet of Things (IoT) refers to the distributed systems environment
connecting billions of devices to the Internet, and quantum computing is an emerging …
connecting billions of devices to the Internet, and quantum computing is an emerging …
Feistel structures for MPC, and more
Efficient PRP/PRFs are instrumental to the design of cryptographic protocols. We investigate
the design of dedicated PRP/PRFs for three application areas-secure multiparty computation …
the design of dedicated PRP/PRFs for three application areas-secure multiparty computation …
Quantum chosen-ciphertext attacks against Feistel ciphers
G Ito, A Hosoyamada, R Matsumoto, Y Sasaki… - Topics in Cryptology–CT …, 2019 - Springer
Seminal results by Luby and Rackoff show that the 3-round Feistel cipher is secure against
chosen-plaintext attacks (CPAs), and the 4-round version is secure against chosen …
chosen-plaintext attacks (CPAs), and the 4-round version is secure against chosen …
Quantum attacks on some Feistel block ciphers
X Dong, B Dong, X Wang - Designs, Codes and Cryptography, 2020 - Springer
Post-quantum cryptography has attracted much attention from worldwide cryptologists.
However, most research works are related to public-key cryptosystem due to Shor's attack …
However, most research works are related to public-key cryptosystem due to Shor's attack …
4-round Luby-Rackoff construction is a qPRP
A Hosoyamada, T Iwata - International Conference on the Theory and …, 2019 - Springer
Abstract The Luby-Rackoff construction, or the Feistel construction, is one of the most
important approaches to construct secure block ciphers from secure pseudorandom …
important approaches to construct secure block ciphers from secure pseudorandom …
Links between Quantum Distinguishers Based on Simon's Algorithm and Truncated Differentials
Z **ang, X Wang, B Yu, B Sun, S Zhang… - IACR Transactions on …, 2024 - er.ceres.rub.de
In this paper, we study the quantum security of block ciphers based on Simon's period-
finding quantum algorithm. We explored the relations between periodic functions and …
finding quantum algorithm. We explored the relations between periodic functions and …
Applications of Simon's algorithm in quantum attacks on Feistel variants
J Cui, J Guo, S Ding - Quantum Information Processing, 2021 - Springer
Simon's algorithm is a well-known quantum algorithm which can achieve an exponential
acceleration over classical algorithm. It has been widely used in quantum cryptanalysis of …
acceleration over classical algorithm. It has been widely used in quantum cryptanalysis of …
Quantum zero correlation linear cryptanalysis
R Shi, H **e, H Feng, F Yuan, B Liu - Quantum Information Processing, 2022 - Springer
The advent of large-scale quantum computers would greatly threaten the security of current
cryptosystems. It is urgent to investigate how quantum computing will affect the security of …
cryptosystems. It is urgent to investigate how quantum computing will affect the security of …
Quantum -medoids algorithm using parallel amplitude estimation
YM Li, HL Liu, SJ Pan, SJ Qin, F Gao, DX Sun, QY Wen - Physical Review A, 2023 - APS
Quantum computing is a promising paradigm that can provide viable solutions to high-
complexity problems. The k-medoids algorithm is a powerful clustering method ubiquitously …
complexity problems. The k-medoids algorithm is a powerful clustering method ubiquitously …
On the state of post-quantum cryptography migration
Safeguarding current and future IT security from quantum computers implies more than the
mere development of Post-Quantum Cryptography (PQC) algorithms. Much work in this …
mere development of Post-Quantum Cryptography (PQC) algorithms. Much work in this …