2022
DOI: 10.1007/978-3-031-22912-1_23
|View full text |Cite
|
Sign up to set email alerts
|

Improved Quantum Analysis of SPECK and LowMC

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
24
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(24 citation statements)
references
References 28 publications
0
24
0
Order By: Relevance
“…The quantum circuit given by LIGHTER-R requires the optimal number of qubits. Recently, the tool has been widely applied in the quantum circuit implementation of other cryptography, such as Present and Gift [39], RECTANGLE and KNOT [40], DEFAULT [41] and so on.…”
Section: A Decomposition Of S-boxmentioning
confidence: 99%
See 1 more Smart Citation
“…The quantum circuit given by LIGHTER-R requires the optimal number of qubits. Recently, the tool has been widely applied in the quantum circuit implementation of other cryptography, such as Present and Gift [39], RECTANGLE and KNOT [40], DEFAULT [41] and so on.…”
Section: A Decomposition Of S-boxmentioning
confidence: 99%
“…Huang et al [26] gave the circuit for |a〉|b〉 → |a〉|b ⊕ S(a)〉 with a T-depth of 3, and then further reduced the Tdepth required for the quantum circuit of AES-128 to 60. Jang et al [27] synthesized the quantum circuit of AES-128 with a T-depth of 30 by introducing an improved pipeline method for round function iteration.…”
Section: Introductionmentioning
confidence: 99%
“…We added large adders circuits which are performing an addition over two registers of size 1024, 2048 and 4096 qubits, the implementation of these circuits is based on Reference [29]. We also added a circuit, given in Reference [30], that is an implementation of the block cipher DEFAULT. Finally, we added quantum circuits implementing the modular exponentiation part of Shor's algorithm for number factoring over 4, 8, 16 and 32 bits.…”
Section: Benchmarksmentioning
confidence: 99%
“…In response, various symmetric key ciphers are being analysed under the Grover search algorithm [ 3 , 4 , 5 , 6 ]. It is worth noting that the quantum resources (elements that make up a quantum circuit such as quantum gates, qubits, and circuit depth) for applying the Grover’s search to AES [ 3 , 7 , 8 , 9 ] are being used as a standard for estimating post-quantum security strength by NIST [ 10 ].…”
Section: Introductionmentioning
confidence: 99%