Quantum reversible circuit of AES-128

[1]  Som Maire,et al.  Protection , 2008, Encyclopedia of the UN Sustainable Development Goals.

[2]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[3]  María Naya-Plasencia,et al.  An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography , 2017, ASIACRYPT.

[4]  María Naya-Plasencia,et al.  Breaking Symmetric Cryptosystems Using Quantum Period Finding , 2016, CRYPTO.

[5]  Poonam Kadam,et al.  Pipelined Implementation of Dynamic Rijndael S-Box , 2015 .

[6]  Marc Kaplan,et al.  Quantum attacks against iterated block ciphers , 2014, ArXiv.

[7]  Martin Roetteler,et al.  A note on quantum related-key attacks , 2013, Inf. Process. Lett..

[8]  Kamalika Datta,et al.  Reversible logic implementation of AES algorithm , 2013, 2013 8th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS).

[9]  R. V. Kshirsagar,et al.  FPGA Implementation of High Speed VLSI Architectures for AES Algorithm , 2012, 2012 Fifth International Conference on Emerging Trends in Engineering and Technology.

[10]  Achim Rettberg,et al.  Implementation of the AES Algorithm for a Reconfigurable, Bit Serial, Fully Pipelined Architecture , 2009, ARC.

[11]  Arash Reyhani-Masoleh,et al.  A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases , 2008, CHES.

[12]  John P. Hayes,et al.  Optimal synthesis of linear reversible circuits , 2008, Quantum Inf. Comput..

[13]  Dhiraj K. Pradhan,et al.  On the Design and Optimization of a Quantum Polynomial-Time Attack on Elliptic Curve Cryptography , 2007, TQC.

[14]  N. D. Mermin Quantum Computer Science: An Introduction , 2007 .

[15]  David Canright,et al.  A Very Compact S-Box for AES , 2005, CHES.

[16]  Keshab K. Parhi,et al.  High-speed VLSI architectures for the AES algorithm , 2004, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[17]  M. Anwar Hasan,et al.  Low complexity bit parallel architectures for polynomial basis multiplication over GF(2m) , 2004, IEEE Transactions on Computers.

[18]  今井 浩 20世紀の名著名論:Peter Shor : Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 2004 .

[19]  Andris Ambainis,et al.  Quantum walk algorithm for element distinctness , 2003, 45th Annual IEEE Symposium on Foundations of Computer Science.

[20]  Edward F. Schaefer,et al.  A SIMPLIFIED AES ALGORITHM AND ITS LINEAR AND DIFFERENTIAL CRYPTANALYSES , 2003, Cryptologia.

[21]  Matti Tommiska,et al.  A fully pipelined memoryless 17.8 Gbps AES-128 encryptor , 2003, FPGA '03.

[22]  Christof Paar,et al.  Itoh-Tsujii Inversion in Standard Basis and Its Application in Cryptography and Codes , 2002, Des. Codes Cryptogr..

[23]  H. Ishizuka,et al.  Quantum cryptanalysis of block ciphers (Algebraic Systems, Formal Languages and Computations) , 2000 .

[24]  R. Feynman Simulating physics with computers , 1999 .

[25]  Lov K. Grover A fast quantum mechanical algorithm for database search , 1996, STOC '96.

[26]  Daniel R. Simon,et al.  On the power of quantum computation , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[27]  D. Dieks Communication by EPR devices , 1982 .

[28]  W. Wootters,et al.  A single quantum cannot be cloned , 1982, Nature.

[29]  Valérie Gauthier Umana,et al.  Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29 - December 2, 2011. Proceedings , 2011, PQCrypto.

[30]  Martin E. Hellman,et al.  Chosen-Key Attacks on a Block Cipher , 1987, Cryptologia.

[31]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.