Quantum exhaustive key search with simplified-DES as a case study
暂无分享,去创建一个
Rosni Abdullah | Azman Samsudin | Mishal Almazrooie | Kussay N. Mutter | A. Samsudin | R. Abdullah | K. N. Mutter | Mishal Almazrooie
[1] 山村 明弘,et al. Quantum cryptanalysis of block ciphers (Algebraic Systems, Formal Languages and Computations) , 2000 .
[2] Lov K. Grover. A fast quantum mechanical algorithm for database search , 1996, STOC '96.
[3] Tanja Lange,et al. Post-quantum cryptography , 2008, Nature.
[4] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[5] Gilles Brassard,et al. Quantum Counting , 1998, ICALP.
[6] William Stallings,et al. Cryptography and network security - principles and practice (3. ed.) , 2014 .
[7] E. Lucero,et al. Computing prime factors with a Josephson phase qubit quantum processor , 2012, Nature Physics.
[8] Bruce Schneier,et al. Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.
[9] Tang Ming . Wei Lian. Si Tuo Lin Si,et al. Cryptography and Network Security - Principles and Practice , 2015 .
[10] Ralph Howard,et al. Data encryption standard , 1987 .
[11] Takashi Mihara,et al. Quantum protocols for untrusted computations , 2007, J. Discrete Algorithms.
[12] Robert Spalek,et al. Quantum Fan-out is Powerful , 2005, Theory Comput..
[13] Christof Zalka. GROVER'S QUANTUM SEARCHING ALGORITHM IS OPTIMAL , 1997, quant-ph/9711070.
[14] Bruce Schneier,et al. The Twofish encryption algorithm: a 128-bit block cipher , 1999 .
[15] Jaewan Kim,et al. Secure sequential transmission of quantum information , 2015, Quantum Inf. Process..
[16] H. Bechmann-Pasquinucci,et al. Quantum cryptography , 2001, quant-ph/0101098.
[17] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[18] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[19] B. Lanyon,et al. Experimental demonstration of a compiled version of Shor's algorithm with quantum entanglement. , 2007, Physical review letters.
[20] N. Mermin. Quantum Computer Science: An Introduction , 2007 .
[21] X-Q Zhou,et al. Experimental realization of Shor's quantum factoring algorithm using qubit recycling , 2011, Nature Photonics.
[22] Robert Spalek,et al. Quantum Fanout is Powerful , 2005 .
[23] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[24] Rubens Viana Ramos,et al. Quantum protocols for zero-knowledge systems , 2010, Quantum Inf. Process..
[25] Martin Roetteler,et al. A note on quantum related-key attacks , 2013, Inf. Process. Lett..
[26] Gilles Brassard,et al. Tight bounds on quantum searching , 1996, quant-ph/9605034.
[27] Gilles Brassard,et al. Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.
[28] Michael J. Wiener,et al. Cryptanalysis of Short RSA Secret Exponents (Abstract) , 1990, EUROCRYPT.
[29] Edward F. Schaefer. A Simplified Data Encryption Standard Algorithm , 1996, Cryptologia.
[30] Igor L. Markov,et al. Faster Quantum Number Factoring via Circuit Synthesis , 2013, ArXiv.
[31] Brian A. Carter,et al. Advanced Encryption Standard , 2007 .