Quantum analysis of AES

K Jang, A Baksi, H Kim, G Song, H Seo… - Cryptology ePrint …, 2022 - eprint.iacr.org
Quantum computing is considered among the next big leaps in computer science. While a
fully functional quantum computer is still in the future, there is an ever-growing need to …

Quantum implementation and resource estimates for rectangle and knot

A Baksi, K Jang, G Song, H Seo, Z Xiang - Quantum Information …, 2021 - Springer
With the advancement of the quantum computing technologies, a large body of research
work is dedicated to revisit the security claims for ciphers being used. An adversary with …

Quantum implementation and analysis of default

K Jang, A Baksi, J Breier, H Seo… - Cryptography and …, 2023 - Springer
In this paper, we present the quantum implementation and analysis of the recently proposed
block cipher, DEFAULT. This cipher consists of two components, namely DEFAULT-LAYER …

Efficient implementation of lightweight hash functions on GPU and quantum computers for IoT applications

WK Lee, K Jang, G Song, H Kim, SO Hwang… - IEEE Access, 2022 - ieeexplore.ieee.org
Secure communication is important for Internet of Things (IoT) applications, to avoid cyber-
security attacks. One of the key security aspects is data integrity, which can be protected by …

Grover on KATAN: Quantum resource estimation

M Rahman, G Paul - IEEE Transactions on Quantum …, 2022 - ieeexplore.ieee.org
This article presents the cost analysis of mounting Grover's key search attack on the family of
KATAN block cipher. Several designs of the reversible quantum circuit of KATAN are …

(In) Security of Stream Ciphers Against Quantum Annealing Attacks on the Example of the Grain 128 and Grain 128a Ciphers

M Wroński, E Burek, M Leśniak - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The security level of a cipher is a key parameter. While general-purpose quantum computers
significantly threaten modern symmetric ciphers, other quantum approaches like quantum …

[图书][B] Status report on the final round of the NIST lightweight cryptography standardization process

MS Turan, MS Turan, K McKay, D Chang, LE Bassham… - 2023 - nvlpubs.nist.gov
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more schemes that provide Authenticated …

Evaluation of Grover's algorithm toward quantum cryptanalysis on ChaCha

B Bathe, R Anand, S Dutta - Quantum Information Processing, 2021 - Springer
In this work, we have analyzed ChaCha against Grover's search algorithm. We designed a
reversible quantum circuit of ChaCha and then estimated the resources required to …

Depth-optimized implementation of ASCON quantum circuit

Y Oh, K Jang, A Baksi, H Seo - Cryptology ePrint Archive, 2023 - eprint.iacr.org
The development of quantum computers, which employ a different paradigm of computation,
is posing a threat to the security of cryptography. Narrowing down the scope to symmetric …

Quantum security analysis of Rocca

R Anand, T Isobe - Quantum Information Processing, 2023 - Springer
The recent developments in the creation of large-scale, commercially feasible quantum
computers puts both symmetric and asymmetric encryption at risk. As they assess the …