Results 81 to 90 of about 5,946 (156)
A new non-commutative key exchange protocol on combinatorial semigroup
Since the launch of the post-quantum cryptography standardization project by NIST, post-quantum cryptography has become a prominent research area. Non-commutative cryptography constructed using NP-complete problems is widely regarded resistant to quantum
Jing Zhang, Ya-Juan Yang, JingJing Bao
doaj +1 more source
Cryptanalysis of some protocols using matrices over group rings
We address a cryptanalysis of two protocols based on the supposed difficulty of discrete logarithm problem on (semi) groups of matrices over a group ring.
Eftekhari, Mohammad
core
A Quantum Differential Attack on ChaCha and Related Resources Estimation
Existing classical cryptanalytic techniques against ChaCha primarily rely on differential cryptanalysis, leveraging probabilistic neutral bits (PNBs) introduced by Aumasson et al. Separately, Bathe et al.
Mintu Mandal +2 more
doaj +1 more source
Quantum Attacks on MIBS Block Cipher Based on Bernstein–Vazirani Algorithm
Because of the substantial progress in quantum computing technology, the safety of traditional cryptologic schemes is facing serious challenges. In this study, we explore the quantum safety of the lightweight cipher MIBS and propose quantum key-recovery ...
Huiqin Xie +4 more
doaj +1 more source
HHL Algorithm for Tensor-Decomposable Matrices
We use the HHL algorithm to retrieve a quantum state holding the algebraic normal form (ANF) of a Boolean function. Unlike the standard HHL applications, we do not describe the cipher as an exponentially big system of equations.
Cezary Pilaszewicz, Marian Margraf
doaj +1 more source
An Extended Analysis of the Correlation Extraction Algorithm in the Context of Linear Cryptanalysis
In cryptography, techniques and tools developed in the subfield of linear cryptanalysis have previously successfully been used to allow attackers to break many sophisticated cryptographic ciphers.
Christoph Graebnitz +5 more
doaj +1 more source
A set of quantum protocols for online shopping is proposed and analyzed to establish that it is possible to perform secure online shopping using different types of quantum resources. Specifically, a single photon based, a Bell state based and two 3-qubit
Pathak, Anirban, Thapliyal, Kishore
core
At EUROCRYPT 2020, Hosoyamada and Sasaki proposed the first dedicated quantum collision attacks on hash functions. Their proposal presented a quantum adaptation of the rebound attack and revealed that differential trails, which have too low probability ...
Dongjae Lee, Seokhie Hong
doaj +1 more source
Prospects for Legal Regulation of Quantum Communication
The leading countries across the world have entered the race to develop quantum technologies that will enable them to ensure their continued economic prosperity.
A. Minbaleev, S. Zenin, K. Evsikov
doaj +1 more source
Cryptographic Protection for Military Radio Communications [PDF]
Robert Białas +2 more
doaj +1 more source

