International audienceDue to Shor's algorithm, quantum computers are a severe threat for public key cryptography. This motivated the cryptographic community to search for quantum-safe solutions. On the other hand, the impact of quantum computing on secret key cryptography is much less understood. In this paper, we consider attacks where an adversary can query an oracle implementing a cryptographic primitive in a quantum superposition of different states. This model gives a lot of power to the adversary, but recent results show that it is nonetheless possible to build secure cryptosystems in it. We study applications of a quantum procedure called Simon's algorithm (the simplest quantum period finding algorithm) in order to attack symmetric c...
In this paper, quantum attacks against symmetric-key schemes are presented in which adversaries only...
International audienceIt was long thought that symmetric cryptography was only mildly affected by qu...
In this thesis, we study the security of cryptographic systems against an adversary who has access t...
International audienceRecent works have shown that quantum period-finding can be used to break many ...
We present new connections between quantum information and the field of classical cryptography. In p...
International audienceWe present the first complete descriptions of quantum circuits for the offline...
International audienceIn symmetric cryptanalysis, the model of superposition queries has led to surp...
AEZ is an authenticated encryption algorithm, submitted to the CAESAR competition. It has been selec...
We present the first complete descriptions of quantum circuits for the offline Simon’s algorithm, an...
International audienceAEZ is an authenticated encryption algorithm, submitted to the CAESAR competit...
We present the first complete implementation of the offline Simon\u27s algorithm, and estimate its c...
International audienceIn this paper, we report the first quantum key-recovery attack on a symmetric ...
International audienceQuantum computers, that may become available one day, would impact many scient...
Recently, in Asiacrypt 2019, Bonnetain et. al have shown attacks by quantum adversaries on FX constr...
We present the first complete descriptions of quantum circuits for the offline Simon’s algorithm, an...
In this paper, quantum attacks against symmetric-key schemes are presented in which adversaries only...
International audienceIt was long thought that symmetric cryptography was only mildly affected by qu...
In this thesis, we study the security of cryptographic systems against an adversary who has access t...
International audienceRecent works have shown that quantum period-finding can be used to break many ...
We present new connections between quantum information and the field of classical cryptography. In p...
International audienceWe present the first complete descriptions of quantum circuits for the offline...
International audienceIn symmetric cryptanalysis, the model of superposition queries has led to surp...
AEZ is an authenticated encryption algorithm, submitted to the CAESAR competition. It has been selec...
We present the first complete descriptions of quantum circuits for the offline Simon’s algorithm, an...
International audienceAEZ is an authenticated encryption algorithm, submitted to the CAESAR competit...
We present the first complete implementation of the offline Simon\u27s algorithm, and estimate its c...
International audienceIn this paper, we report the first quantum key-recovery attack on a symmetric ...
International audienceQuantum computers, that may become available one day, would impact many scient...
Recently, in Asiacrypt 2019, Bonnetain et. al have shown attacks by quantum adversaries on FX constr...
We present the first complete descriptions of quantum circuits for the offline Simon’s algorithm, an...
In this paper, quantum attacks against symmetric-key schemes are presented in which adversaries only...
International audienceIt was long thought that symmetric cryptography was only mildly affected by qu...
In this thesis, we study the security of cryptographic systems against an adversary who has access t...