Synthesizing Quantum Circuits of AES with Lower T-depth and Less Qubits

Z Huang, S Sun - International Conference on the Theory and …, 2022 - Springer
The significant progress in the development of quantum computers has made the study of
cryptanalysis based on quantum computing an active topic. To accurately estimate the …

Quantum algorithms for attacking hardness assumptions in classical and post‐quantum cryptography

JF Biasse, X Bonnetain, E Kirshanova… - IET Information …, 2023 - Wiley Online Library
In this survey, the authors review the main quantum algorithms for solving the computational
problems that serve as hardness assumptions for cryptosystem. To this end, the authors …

Quantum cryptanalytic attacks of symmetric ciphers: A review

AK Malviya, N Tiwari, M Chawla - Computers and Electrical Engineering, 2022 - Elsevier
A review of several latest quantum cryptanalysis techniques of symmetric cryptography is
covered. Primarily, the design theory of the quantum cryptanalysis approach is explained …

Survey of promising technologies for quantum drones and networks

A Kumar, S Bhatia, K Kaushik, SM Gandhi… - Ieee …, 2021 - ieeexplore.ieee.org
Due to recent advancements in quantum drones, the Internet of Quantum Drones (IoQDs),
and Drone-to-Satellite connectivity, several advantages have been anticipated for real-time …

Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound

A Hosoyamada, Y Sasaki - … 2020: 39th Annual International Conference on …, 2020 - Springer
In this paper we spot light on dedicated quantum collision attacks on concrete hash
functions, which has not received much attention so far. In the classical setting, the generic …

Weighted persistent homology for osmolyte molecular aggregation and hydrogen-bonding network analysis

DV Anand, Z Meng, K **a, Y Mu - Scientific reports, 2020 - nature.com
It has long been observed that trimethylamine N-oxide (TMAO) and urea demonstrate
dramatically different properties in a protein folding process. Even with the enormous …

Quantum collision attacks on AES-like hashing with low quantum random access memories

X Dong, S Sun, D Shi, F Gao, X Wang, L Hu - International Conference on …, 2020 - Springer
Abstract At EUROCRYPT 2020, Hosoyamada and Sasaki proposed the first dedicated
quantum attack on hash functions—a quantum version of the rebound attack exploiting …

Shorter signatures based on tailor-made minimalist symmetric-key crypto

C Dobraunig, D Kales, C Rechberger… - Proceedings of the …, 2022 - dl.acm.org
Signature schemes based on the MPC-in-the-head approach (MPCitH) have either been
designed by taking a proof system and selecting a suitable symmetric-key primitive (Picnic …

Quantum linearization attacks

X Bonnetain, G Leurent, M Naya-Plasencia… - Advances in Cryptology …, 2021 - Springer
Recent works have shown that quantum period-finding can be used to break many popular
constructions (some block ciphers such as Even-Mansour, multiple MACs and AEs...) in the …

Post-quantum cryptography for internet of things: a survey on performance and optimization

T Liu, G Ramachandran, R Jurdak - arxiv preprint arxiv:2401.17538, 2024 - arxiv.org
Due to recent development in quantum computing, the invention of a large quantum
computer is no longer a distant future. Quantum computing severely threatens modern …