2017
DOI: 10.1007/978-3-319-72565-9_21
|View full text |Cite
|
Sign up to set email alerts
|

Quantum Key Search with Side Channel Advice

Abstract: Abstract. Recently, a number of results have been published that show how to combine classical cryptanalysis with quantum algorithms, thereby (potentially) achieving considerable speed-ups. We follow this trend but add a novel twist by considering how to utilise side channel leakage in a quantum setting. This is non-trivial because Grover's algorithm deals with unstructured data, however we are interested in searching through a key space which has structure due to the side channel information. We present a nov… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
25
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(25 citation statements)
references
References 23 publications
0
25
0
Order By: Relevance
“…Broadly speaking, optimal key enumeration algorithms [18,28] tend to consume more memory and to be less efficient while generating high-scoring key candidates, whereas nonoptimal key enumeration algorithms [12][13][14][15][16][17]26,29] are expected to run faster and to consume less memory. Table 1 shows a preliminary taxonomy of the key enumeration algorithms to be reviewed in this section.…”
Section: Key Enumeration Algorithmsmentioning
confidence: 99%
See 4 more Smart Citations
“…Broadly speaking, optimal key enumeration algorithms [18,28] tend to consume more memory and to be less efficient while generating high-scoring key candidates, whereas nonoptimal key enumeration algorithms [12][13][14][15][16][17]26,29] are expected to run faster and to consume less memory. Table 1 shows a preliminary taxonomy of the key enumeration algorithms to be reviewed in this section.…”
Section: Key Enumeration Algorithmsmentioning
confidence: 99%
“…In this subsection, we will describe a quantum key enumeration algorithm introduced in the research paper [29] for the sake of completeness. This algorithm is constructed from a nonoptimal key enumeration algorithm, which uses the key rank algorithm given by Martin et al in the research paper [16] to return a single key candidate (the r th ) with a weight in a particular range.…”
Section: A Quantum Key Search Algorithmmentioning
confidence: 99%
See 3 more Smart Citations