2019
DOI: 10.1007/978-3-030-12612-4_20
|View full text |Cite
|
Sign up to set email alerts
|

Quantum Chosen-Ciphertext Attacks Against Feistel Ciphers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
1
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 44 publications
(14 citation statements)
references
References 17 publications
0
12
1
1
Order By: Relevance
“…Following [40,33,17], we will adopt the Q1 / Q2 terminology to classify quantum attacks on symmetric schemes. Note that these models have alternative names, for example "quantum chosen-plaintext attack" (qCPA) is used for "Q2" in [34,22]. In the Q1 setting, the adversary is given only classical encryption or decryption query access to black-boxes.…”
Section: Attack Scenariosmentioning
confidence: 99%
“…Following [40,33,17], we will adopt the Q1 / Q2 terminology to classify quantum attacks on symmetric schemes. Note that these models have alternative names, for example "quantum chosen-plaintext attack" (qCPA) is used for "Q2" in [34,22]. In the Q1 setting, the adversary is given only classical encryption or decryption query access to black-boxes.…”
Section: Attack Scenariosmentioning
confidence: 99%
“…We will use, for its simplicity, the Q1 / Q2 terminology of [39,31,12], which is the most common in quantum cryptanalysis works. Alternative names exist, such as "quantum chosen-plaintext attack" (qCPA) instead of Q2, found in most provable security works (e.g., [6]) and [36,18].…”
Section: Contextmentioning
confidence: 99%
“…Many common quantum attack methods( [24][25] [26] [27]) are also the application and extension of Simon's algorithm.…”
Section: Introductionmentioning
confidence: 99%