搜索结果: 1-12 共查到“军事学 quantum-security”相关记录12条 . 查询时间(0.109 秒)
In this paper we analyze for the first time the post-quantum security of AES. AES is the most popular and widely used block cipher, established as the encryption standard by the NIST in 2001. We consi...
We present an improved version of the one-way to hiding (O2H) lemma by Unruh, J ACM 2015. Our new O2H lemma gives higher flexibility (arbitrary joint distributions of oracles and inputs, multiple repr...
Quantum Security Analysis of CSIDH and Ordinary Isogeny-based Schemes
Post-quantum cryptography isogeny-based cryptography hidden shift problem
2018/6/5
CSIDH is a recent proposal by Castryck, Lange, Martindale, Panny and Renes for post-quantum non-interactive key-exchange. It is similar in design to a scheme by Couveignes, Rostovtsev and Stolbunov, b...
A voting scheme with post-quantum security based on physical laws
voting scheme no-key protocol post-quantum security
2018/5/22
Traditional cryptography is under huge threat along of the evolution of quantum information and computing. In this paper, we propose a new post-quantum voting scheme based on physical laws by using en...
Post-quantum security of the sponge construction
Post-quantum cryptography hash functions Sponge construction
2017/8/16
We investigate the post-quantum security of hash functions based on the sponge construction. A crucial property for hash functions in the post-quantum setting is the collapsing property (a strengtheni...
SPHINCS-Simpira: Fast Stateless Hash-based Signatures with Post-quantum Security
Simpira SPHINCS post-quantum security
2017/7/6
We introduce SPHINCS-Simpira, which is a variant of the SPHINCS signature scheme with Simpira as a building block. SPHINCS was proposed by Bernstein et al. at EUROCRYPT 2015 as a hash-based signature ...
We prove the security of NMAC, HMAC, AMAC, and the cascade construction with fixed input-length as quantum-secure pseudo-random functions (PRFs). Namely, they are indistinguishable from a random oracl...
Post-Quantum Security of Fiat-Shamir
quantum cryptography zero knowledge digital signatures
2017/5/11
The Fiat-Shamir construction (Crypto 1986) is an efficient transformation in the random oracle model for creating non-interactive proof systems and signatures from sigma-protocols. In classical crypto...
Collapsing sponges: Post-quantum security of the sponge construction
quantum cryptography hash functions
2017/3/31
We investigate the post-quantum security of hash functions based on the sponge construction. A crucial property for hash functions in the post-quantum setting is the collapsing property (a strengtheni...
Post-quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of Operation
Post-quantum cryptography Block ciphers Modes of operation
2016/2/25
We examine the IND-qCPA security of the wide-spread block cipher modes of operation
CBC, CFB, OFB, CTR, and XTS (i.e., security against quantum adversaries doing queries
in superposition). We show t...
Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
Quantum Random oracle Indistinguishability against chosen ciphertext attack
2016/1/27
In this paper, we present a hybrid encryption scheme that is chosen ciphertext secure
in the quantum random oracle model. Our scheme is a combination of an asymmetric and
a symmetric encryption sche...
Shor’s quantum factoring algorithm and a few other efficient quantum algorithms break many classical
crypto-systems. In response, people proposed post-quantum cryptography based on computational
pro...