We present the first complete descriptions of quantum circuits for the offline Simon’s algorithm, and estimate their cost to attack the MAC Chaskey, the block cipher PRINCE and the NIST lightweight finalist AEAD scheme Elephant. These attacks require a reasonable amount of qubits, comparable to the number of qubits required to break RSA-2048. They are faster than other collision algorithms, and the attacks against PRINCE and Chaskey are the most efficient known to date. As Elephant has a key smaller than its state size, the algorithm is less efficient and its cost ends up very close to or above the cost of exhaustive search. We also propose an optimized quantum circuit for boolean linear algebra as well as complete reversible implementation...
Abstract: Contemporary cryptographic algorithms are resistant to the strongest threats to cybersecur...
Quantum computing is considered among the next big leaps in computer science. While a fully function...
Grover\u27s search algorithm gives a quantum attack against block ciphers with query complexity $O(\...
International audienceWe present the first complete descriptions of quantum circuits for the offline...
We present the first complete implementation of the offline Simon\u27s algorithm, and estimate its c...
We present the first complete descriptions of quantum circuits for the offline Simon’s algorithm, an...
International audienceDue to Shor's algorithm, quantum computers are a severe threat for public key ...
International audienceIn symmetric cryptanalysis, the model of superposition queries has led to surp...
International audienceIn this paper, we report the first quantum key-recovery attack on a symmetric ...
In this paper, quantum attacks against symmetric-key schemes are presented in which adversaries only...
AEZ is an authenticated encryption algorithm, submitted to the CAESAR competition. It has been selec...
International audienceRecent works have shown that quantum period-finding can be used to break many ...
International audienceAEZ is an authenticated encryption algorithm, submitted to the CAESAR competit...
Quantum computers hold the potential to solve problems that are intractable for classical computers,...
In this paper, we present a detailed study of the cost of the quantum key search attack using Grover...
Abstract: Contemporary cryptographic algorithms are resistant to the strongest threats to cybersecur...
Quantum computing is considered among the next big leaps in computer science. While a fully function...
Grover\u27s search algorithm gives a quantum attack against block ciphers with query complexity $O(\...
International audienceWe present the first complete descriptions of quantum circuits for the offline...
We present the first complete implementation of the offline Simon\u27s algorithm, and estimate its c...
We present the first complete descriptions of quantum circuits for the offline Simon’s algorithm, an...
International audienceDue to Shor's algorithm, quantum computers are a severe threat for public key ...
International audienceIn symmetric cryptanalysis, the model of superposition queries has led to surp...
International audienceIn this paper, we report the first quantum key-recovery attack on a symmetric ...
In this paper, quantum attacks against symmetric-key schemes are presented in which adversaries only...
AEZ is an authenticated encryption algorithm, submitted to the CAESAR competition. It has been selec...
International audienceRecent works have shown that quantum period-finding can be used to break many ...
International audienceAEZ is an authenticated encryption algorithm, submitted to the CAESAR competit...
Quantum computers hold the potential to solve problems that are intractable for classical computers,...
In this paper, we present a detailed study of the cost of the quantum key search attack using Grover...
Abstract: Contemporary cryptographic algorithms are resistant to the strongest threats to cybersecur...
Quantum computing is considered among the next big leaps in computer science. While a fully function...
Grover\u27s search algorithm gives a quantum attack against block ciphers with query complexity $O(\...