Toward quantum secured distributed energy resources: Adoption of post-quantum cryptography (pqc) and quantum key distribution (qkd)

J Ahn, HY Kwon, B Ahn, K Park, T Kim, MK Lee, J Kim… - Energies, 2022 - mdpi.com
Quantum computing is a game-changing technology that affects modern cryptography and
security systems including distributed energy resources (DERs) systems. Since the new …

Qram: A survey and critique

S Jaques, AG Rattew - arxiv preprint arxiv:2305.10310, 2023 - arxiv.org
Quantum random-access memory (QRAM) is a mechanism to access data (quantum or
classical) based on addresses which are themselves a quantum state. QRAM has a long …

Synthesizing Quantum Circuits of AES with Lower T-depth and Less Qubits

Z Huang, S Sun - International Conference on the Theory and …, 2022 - Springer
The significant progress in the development of quantum computers has made the study of
cryptanalysis based on quantum computing an active topic. To accurately estimate the …

Assessing the benefits and risks of quantum computers

TL Scholten, CJ Williams, D Moody, M Mosca… - arxiv preprint arxiv …, 2024 - arxiv.org
Quantum computing is an emerging technology with potentially far-reaching implications for
national prosperity and security. Understanding the timeframes over which economic …

Space and time-efficient quantum multiplier in post quantum cryptography era

DSC Putranto, RW Wardhani, HT Larasati… - IEEE Access, 2023 - ieeexplore.ieee.org
This paper examines the asymptotic performance of multiplication and the cost of quantum
implementation for the Naive schoolbook, Karatsuba, and Toom-Cook methods in the …

Grover on KATAN: Quantum resource estimation

M Rahman, G Paul - IEEE Transactions on Quantum …, 2022 - ieeexplore.ieee.org
This article presents the cost analysis of mounting Grover's key search attack on the family of
KATAN block cipher. Several designs of the reversible quantum circuit of KATAN are …

Concrete analysis of quantum lattice enumeration

S Bai, MI van Hoof, FB Johnson, T Lange… - … Conference on the Theory …, 2023 - Springer
Lattice reduction algorithms such as BKZ (Block-Korkine-Zolotarev) play a central role in
estimating the security of lattice-based cryptography. The subroutine in BKZ which finds the …

Depth-optimization of quantum cryptanalysis on binary elliptic curves

DSC Putranto, RW Wardhani, HT Larasati, J Ji… - IEEE …, 2023 - ieeexplore.ieee.org
This paper presents quantum cryptanalysis for binary elliptic curves from a time-efficient
implementation perspective (ie, reducing the circuit depth), complementing the previous …

New quantum circuit implementations of SM4 and SM3

J Zou, L Li, Z Wei, Y Luo, Q Liu, W Wu - Quantum Information Processing, 2022 - Springer
In this paper, we propose some new quantum circuit implementations of SM4 block cipher
and SM3 hash function, which are based on the following ideas. Firstly, we propose an …

A complete quantum circuit to solve the information set decoding problem

S Perriello, A Barenghi, G Pelosi - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Providing strong security margins against cryptanalytic attackers equipped with quantum
computers is a major research direction fostered by the US National Institute of Standards …