Quantum analysis of AES

K Jang, A Baksi, H Kim, G Song, H Seo… - Cryptology ePrint …, 2022 - eprint.iacr.org
Quantum computing is considered among the next big leaps in computer science. While a
fully functional quantum computer is still in the future, there is an ever-growing need to …

Quantum encryption with quantum permutation pad in IBMQ systems

R Kuang, M Perepechaenko - EPJ Quantum Technology, 2022 - epjqt.epj.org
Quantum permutation pad or QPP is a quantum-safe symmetric cryptographic algorithm
proposed by Kuang and Bettenburg in 2020. The theoretical foundation of QPP leverages …

Quantum implementation and resource estimates for rectangle and knot

A Baksi, K Jang, G Song, H Seo, Z Xiang - Quantum Information …, 2021 - Springer
With the advancement of the quantum computing technologies, a large body of research
work is dedicated to revisit the security claims for ciphers being used. An adversary with …

Quantum implementation and analysis of default

K Jang, A Baksi, J Breier, H Seo… - Cryptography and …, 2023 - Springer
In this paper, we present the quantum implementation and analysis of the recently proposed
block cipher, DEFAULT. This cipher consists of two components, namely DEFAULT-LAYER …

Efficient implementation of lightweight hash functions on GPU and quantum computers for IoT applications

WK Lee, K Jang, G Song, H Kim, SO Hwang… - IEEE Access, 2022 - ieeexplore.ieee.org
Secure communication is important for Internet of Things (IoT) applications, to avoid cyber-
security attacks. One of the key security aspects is data integrity, which can be protected by …

Implementing Grover's on AES-based AEAD schemes

S Mandal, R Anand, M Rahman, S Sarkar, T Isobe - Scientific Reports, 2024 - nature.com
Extensive research is currently underway to determine the security of existing ciphers in light
of the advancements in quantum computing. Against symmetric key cryptography, Grover's …

Dorcis: depth optimized quantum implementation of substitution boxes

M Chun, A Baksi, A Chattopadhyay - Cryptology ePrint Archive, 2023 - eprint.iacr.org
In this paper, we present the``DORCIS''tool, which finds depth-optimized quantum circuit
implementations for arbitrary 3-and 4-bit S-boxes. It follows up from the previous LIGHTER-R …

Improved low-depth SHA3 quantum circuit for fault-tolerant quantum computers

G Song, K Jang, H Seo - Applied Sciences, 2023 - mdpi.com
To build a secure cryptography system in the post-quantum era, one must find the minimum
security parameters against quantum attacks by estimating the quantum resources of a fault …

Quantum security analysis of Rocca

R Anand, T Isobe - Quantum Information Processing, 2023 - Springer
The recent developments in the creation of large-scale, commercially feasible quantum
computers puts both symmetric and asymmetric encryption at risk. As they assess the …

Improved quantum analysis of SPECK and lowmc

K Jang, A Baksi, H Kim, H Seo… - … Conference on Cryptology …, 2022 - Springer
As the prevalence of quantum computing is growing in leaps and bounds over the past few
years, there is an ever-growing need to analyze the symmetric-key ciphers against the …