Results 21 to 30 of about 5,946 (156)
The Case for Quantum Key Distribution [PDF]
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures.
A.R. Dixon +20 more
core +8 more sources
Quantum cryptanalysis of lightweight block cipher Piccolo
By taking the characteristics of the structure of Piccolo algorithm RP permutation into consideration, a 3-round quantum distinguisher was proposed.Based on Grover meets Simon algorithm, the 6-round of quantum key recovery attack was given.The results ...
Xiaoni DU +3 more
doaj +2 more sources
Evaluating the Efficiency of Physical and Cryptographic Security Solutions for Quantum Immune IoT
The threat of quantum-computer-assisted cryptanalysis is forcing the security community to develop new types of security protocols. These solutions must be secure against classical and post-quantum cryptanalysis techniques as well as feasible for all ...
Jani Suomalainen +3 more
doaj +1 more source
A Ring-LWE-based digital signature inspired by Lindner–Peikert scheme
In this article, we give a digital signature by using Lindner–Peikert cryptosystem. The security of this digital signature is based on the assumptions about hardness of Ring-LWE and Ring-SIS problems, along with providing public key and signature of ...
Sharafi Javad, Daghigh Hassan
doaj +1 more source
Roadmap on optical security [PDF]
Postprint (author's final ...
Javidi, Bahram +2 more
core +2 more sources
Quantum key recovery attack on SIMON32/64
The quantum security of lightweight block ciphers is receiving more and more attention. However, the existing quantum attacks on lightweight block ciphers only focused on the quantum exhaustive search, while the quantum attacks combined with classical ...
Hui Liu, Li Yang
doaj +1 more source
Limitations of the Macaulay matrix approach for using the HHL algorithm to solve multivariate polynomial systems [PDF]
Recently Chen and Gao \cite{ChenGao2017} proposed a new quantum algorithm for Boolean polynomial system solving, motivated by the cryptanalysis of some post-quantum cryptosystems.
Jintai Ding +4 more
doaj +1 more source
Quantum Automated Tools for Finding Impossible Differentials
Due to the superiority of quantum computing, traditional cryptography is facing a severe threat. This makes the security evaluation of cryptographic systems in quantum attack models both significant and urgent.
Huiqin Xie +4 more
doaj +1 more source
Quantum Period Finding against Symmetric Primitives in Practice
We present the first complete descriptions of quantum circuits for the offline Simon’s algorithm, and estimate their cost to attack the MAC Chaskey, the block cipher PRINCE and the NIST lightweight finalist AEAD scheme Elephant.
Xavier Bonnetain, Samuel Jaques
doaj +1 more source
Quantum differential cryptanalysis to the block ciphers
Differential cryptanalysis is one of the most popular methods in attacking block ciphers. However, there still some limitations in traditional differential cryptanalysis.
Li, Hong-Wei, Yang, Li
core +1 more source

