搜索结果: 1-12 共查到“军事学 quantum-security”相关记录12条 . 查询时间(0.122 秒)
Quantum Security Analysis of AES
AES symmetric cryptanalysis quantum cryptanalysis
font style='font-size:12px;'>
2019/3/13
In this paper we analyze for the first time the post-quantum security of AES. AES is the most popular and widely used block cipher, established as the encryption standard by the NIST in 2001. We consi...
Quantum security proofs using semi-classical oracles
Quantum cryptography random oracles
font style='font-size:12px;'>
2018/11/9
We present an improved version of the one-way to hiding (O2H) lemma by Unruh, J ACM 2015. Our new O2H lemma gives higher flexibility (arbitrary joint distributions of oracles and inputs, multiple repr...
Quantum Security Analysis of CSIDH and Ordinary Isogeny-based Schemes
Post-quantum cryptography isogeny-based cryptography hidden shift problem
font style='font-size:12px;'>
2018/6/5
CSIDH is a recent proposal by Castryck, Lange, Martindale, Panny and Renes for post-quantum non-interactive key-exchange. It is similar in design to a scheme by Couveignes, Rostovtsev and Stolbunov, b...
A voting scheme with post-quantum security based on physical laws
voting scheme no-key protocol post-quantum security
font style='font-size:12px;'>
2018/5/22
Traditional cryptography is under huge threat along of the evolution of quantum information and computing. In this paper, we propose a new post-quantum voting scheme based on physical laws by using en...
Post-quantum security of the sponge construction
Post-quantum cryptography hash functions Sponge construction
font style='font-size:12px;'>
2017/8/16
We investigate the post-quantum security of hash functions based on the sponge construction. A crucial property for hash functions in the post-quantum setting is the collapsing property (a strengtheni...
SPHINCS-Simpira: Fast Stateless Hash-based Signatures with Post-quantum Security
Simpira SPHINCS post-quantum security
font style='font-size:12px;'>
2017/7/6
We introduce SPHINCS-Simpira, which is a variant of the SPHINCS signature scheme with Simpira as a building block. SPHINCS was proposed by Bernstein et al. at EUROCRYPT 2015 as a hash-based signature ...
Quantum Security of NMAC and Related Constructions
cascade construction NMAC HMAC
font style='font-size:12px;'>
2017/6/5
We prove the security of NMAC, HMAC, AMAC, and the cascade construction with fixed input-length as quantum-secure pseudo-random functions (PRFs). Namely, they are indistinguishable from a random oracl...
Post-Quantum Security of Fiat-Shamir
quantum cryptography zero knowledge digital signatures
font style='font-size:12px;'>
2017/5/11
The Fiat-Shamir construction (Crypto 1986) is an efficient transformation in the random oracle model for creating non-interactive proof systems and signatures from sigma-protocols. In classical crypto...
Collapsing sponges: Post-quantum security of the sponge construction
quantum cryptography hash functions
font style='font-size:12px;'>
2017/3/31
We investigate the post-quantum security of hash functions based on the sponge construction. A crucial property for hash functions in the post-quantum setting is the collapsing property (a strengtheni...
Post-quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of Operation
Post-quantum cryptography Block ciphers Modes of operation
font style='font-size:12px;'>
2016/2/25
We examine the IND-qCPA security of the wide-spread block cipher modes of operation
CBC, CFB, OFB, CTR, and XTS (i.e., security against quantum adversaries doing queries
in superposition). We show t...
Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
Quantum Random oracle Indistinguishability against chosen ciphertext attack
font style='font-size:12px;'>
2016/1/27
In this paper, we present a hybrid encryption scheme that is chosen ciphertext secure
in the quantum random oracle model. Our scheme is a combination of an asymmetric and
a symmetric encryption sche...
A Note on Quantum Security for Post-Quantum Cryptography
foundations quantum attacks
font style='font-size:12px;'>
2016/1/7
Shor’s quantum factoring algorithm and a few other efficient quantum algorithms break many classical
crypto-systems. In response, people proposed post-quantum cryptography based on computational
pro...