Quantum Key Search with Side Channel Advice
暂无分享,去创建一个
Elisabeth Oswald | Ashley Montanaro | Daniel P. Martin | Daniel James Shepherd | E. Oswald | A. Montanaro | D. Shepherd
[1] Seth Lloyd,et al. Quantum random access memory. , 2007, Physical review letters.
[2] Martin Rötteler,et al. Post-Quantum Cryptography , 2015, Lecture Notes in Computer Science.
[3] Jerry den Hartog,et al. Improving DPA by Peak Distribution Analysis , 2010, Selected Areas in Cryptography.
[4] G. Brassard,et al. Quantum Amplitude Amplification and Estimation , 2000, quant-ph/0005055.
[5] Daniel R. Simon,et al. On the power of quantum computation , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[6] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[7] James Manger,et al. A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS #1 v2.0 , 2001, CRYPTO.
[8] Michael Tunstall,et al. SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip , 2015, CHES.
[9] Adi Shamir,et al. RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis , 2014, CRYPTO.
[10] Lov K. Grover. Quantum Mechanics Helps in Searching for a Needle in a Haystack , 1997, quant-ph/9706033.
[11] Ashley Montanaro,et al. Quantum algorithms: an overview , 2015, npj Quantum Information.
[12] Dominique Unruh,et al. Post-Quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of Operation , 2016, PQCrypto.
[13] Tanja Lange,et al. Tighter, faster, simpler side-channel security evaluations beyond computing power , 2015, IACR Cryptol. ePrint Arch..
[14] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[15] P. Høyer. Arbitrary phases in quantum amplitude amplification , 2000, quant-ph/0006031.
[16] Peter W. Shor,et al. Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[17] Ashley Montanaro,et al. Quantum Search with Advice , 2009, TQC.
[18] Benjamin Sach,et al. How low can you go? Using side-channel data to enhance brute-force key recovery , 2016, IACR Cryptol. ePrint Arch..
[19] François-Xavier Standaert,et al. Security Evaluations beyond Computing Power , 2013, EUROCRYPT.
[20] Lov K. Grover. A fast quantum mechanical algorithm for database search , 1996, STOC '96.
[21] Elisabeth Oswald,et al. Counting Keys in Parallel After a Side Channel Attack , 2015, ASIACRYPT.
[22] María Naya-Plasencia,et al. Quantum Differential and Linear Cryptanalysis , 2015, IACR Trans. Symmetric Cryptol..
[23] Elisabeth Oswald,et al. Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations , 2016, IACR Cryptol. ePrint Arch..
[24] María Naya-Plasencia,et al. Breaking Symmetric Cryptosystems Using Quantum Period Finding , 2016, CRYPTO.
[25] Andrew Chi-Chih Yao,et al. An Almost Optimal Algorithm for Unbounded Searching , 1976, Inf. Process. Lett..
[26] Andrey Bogdanov,et al. Fast and Memory-Efficient Key Recovery in Side-Channel Attacks , 2015, SAC.