Quantum reversible circuit of AES-128
暂无分享,去创建一个
[1] Som Maire,et al. Protection , 2008, Encyclopedia of the UN Sustainable Development Goals.
[2] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[3] María Naya-Plasencia,et al. An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography , 2017, ASIACRYPT.
[4] María Naya-Plasencia,et al. Breaking Symmetric Cryptosystems Using Quantum Period Finding , 2016, CRYPTO.
[5] Poonam Kadam,et al. Pipelined Implementation of Dynamic Rijndael S-Box , 2015 .
[6] Marc Kaplan,et al. Quantum attacks against iterated block ciphers , 2014, ArXiv.
[7] Martin Roetteler,et al. A note on quantum related-key attacks , 2013, Inf. Process. Lett..
[8] Kamalika Datta,et al. Reversible logic implementation of AES algorithm , 2013, 2013 8th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS).
[9] R. V. Kshirsagar,et al. FPGA Implementation of High Speed VLSI Architectures for AES Algorithm , 2012, 2012 Fifth International Conference on Emerging Trends in Engineering and Technology.
[10] Achim Rettberg,et al. Implementation of the AES Algorithm for a Reconfigurable, Bit Serial, Fully Pipelined Architecture , 2009, ARC.
[11] Arash Reyhani-Masoleh,et al. A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases , 2008, CHES.
[12] John P. Hayes,et al. Optimal synthesis of linear reversible circuits , 2008, Quantum Inf. Comput..
[13] Dhiraj K. Pradhan,et al. On the Design and Optimization of a Quantum Polynomial-Time Attack on Elliptic Curve Cryptography , 2007, TQC.
[14] N. D. Mermin. Quantum Computer Science: An Introduction , 2007 .
[15] David Canright,et al. A Very Compact S-Box for AES , 2005, CHES.
[16] Keshab K. Parhi,et al. High-speed VLSI architectures for the AES algorithm , 2004, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[17] M. Anwar Hasan,et al. Low complexity bit parallel architectures for polynomial basis multiplication over GF(2m) , 2004, IEEE Transactions on Computers.
[18] 今井 浩. 20世紀の名著名論:Peter Shor : Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 2004 .
[19] Andris Ambainis,et al. Quantum walk algorithm for element distinctness , 2003, 45th Annual IEEE Symposium on Foundations of Computer Science.
[20] Edward F. Schaefer,et al. A SIMPLIFIED AES ALGORITHM AND ITS LINEAR AND DIFFERENTIAL CRYPTANALYSES , 2003, Cryptologia.
[21] Matti Tommiska,et al. A fully pipelined memoryless 17.8 Gbps AES-128 encryptor , 2003, FPGA '03.
[22] Christof Paar,et al. Itoh-Tsujii Inversion in Standard Basis and Its Application in Cryptography and Codes , 2002, Des. Codes Cryptogr..
[23] H. Ishizuka,et al. Quantum cryptanalysis of block ciphers (Algebraic Systems, Formal Languages and Computations) , 2000 .
[24] R. Feynman. Simulating physics with computers , 1999 .
[25] Lov K. Grover. A fast quantum mechanical algorithm for database search , 1996, STOC '96.
[26] Daniel R. Simon,et al. On the power of quantum computation , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[27] D. Dieks. Communication by EPR devices , 1982 .
[28] W. Wootters,et al. A single quantum cannot be cloned , 1982, Nature.
[29] Valérie Gauthier Umana,et al. Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29 - December 2, 2011. Proceedings , 2011, PQCrypto.
[30] Martin E. Hellman,et al. Chosen-Key Attacks on a Block Cipher , 1987, Cryptologia.
[31] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.