F. Abed, S. R. Fluhrer, C. Forler, E. List, S. Lucks et al., Pipelineable On-line Encryption, Fast Software Encryption -21st International Workshop, FSE 2014, pp.205-223, 2014.
DOI : 10.1007/978-3-662-46706-0_11

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.500.4410

G. Alagic, A. Broadbent, B. Fefferman, T. Gagliardoni, C. Schaffner et al., Computational security of quantum encryption. arXiv preprint, 2016.

M. V. Anand, E. E. Targhi, G. N. Tabia, and D. Unruh, Post-Quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of Operation, Post- Quantum Cryptography -7th International Workshop, pp.44-63, 2016.
DOI : 10.1007/978-3-319-29360-8_4

E. Andreeva, A. Bogdanov, A. Luykx, B. Mennink, E. Tischhauser et al., Parallelizable and Authenticated Online Ciphers, Advances in Cryptology -ASIACRYPT 2013 -19th International Conference on the Theory and Application of Cryptology and Information Security Proceedings, Part I. Lecture Notes in Computer Science, pp.424-443, 2013.
DOI : 10.1007/978-3-642-42033-7_22

URL : https://lirias.kuleuven.be/bitstream/123456789/417503/2/article-2368.pdf

M. Bellare, J. Kilian, and P. Rogaway, The Security of the Cipher Block Chaining Message Authentication Code, Journal of Computer and System Sciences, vol.61, issue.3, pp.362-399, 2000.
DOI : 10.1006/jcss.1999.1694

D. J. Bernstein, Introduction to post-quantum cryptography, pp.1-14, 2009.
DOI : 10.1007/978-3-540-88702-7_1

A. Biryukov and D. Wagner, Slide Attacks, Fast Software Encryption, 6th International Workshop, FSE '99, pp.245-259, 1999.
DOI : 10.1007/3-540-48519-8_18

A. Biryukov and D. Wagner, Advanced Slide Attacks, International Conference on the Theory and Application of Cryptographic Techniques, pp.589-606, 2000.
DOI : 10.1007/3-540-45539-6_41

J. Black and P. Rogaway, CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions, 20th Annual International Cryptology Conference, pp.197-215, 2000.
DOI : 10.1007/3-540-44598-6_12

J. Black and P. Rogaway, A Block-Cipher Mode of Operation for Parallelizable Message Authentication, Advances in Cryptology -EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, pp.384-397, 2002.
DOI : 10.1007/3-540-46035-7_25

D. Boneh, ¨. O. Dagdelen, M. Fischlin, A. Lehmann, C. Schaffner et al., Random Oracles in a Quantum World, Advances in Cryptology ? ASIACRYPT 2011, pp.41-69, 2011.
DOI : 10.1007/978-3-642-25385-0_3

D. Boneh and M. Zhandry, Quantum-Secure Message Authentication Codes, Advances in Cryptology -EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.592-608, 2013.
DOI : 10.1007/978-3-642-38348-9_35

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.248.4295

D. Boneh and M. Zhandry, Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World, Advances in Cryptology - CRYPTO 2013 -33rd Annual Cryptology Conference Proceedings, Part II, pp.361-379, 2013.
DOI : 10.1007/978-3-642-40084-1_21

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.6049

G. Brassard, P. Høyer, K. Kalach, M. Kaplan, S. Laplante et al., Merkle Puzzles in a Quantum World, Advances in Cryptology?CRYPTO 2011, pp.391-410, 2011.
DOI : 10.1007/978-3-642-22792-9_22

A. Broadbent and S. Jeffery, Quantum homomorphic encryption for circuits of low Tgate complexity, Advances in Cryptology?CRYPTO 2015, pp.609-629, 2015.

L. Carter and M. N. Wegman, Universal classes of hash functions (Extended Abstract), Proceedings of the ninth annual ACM symposium on Theory of computing , STOC '77
DOI : 10.1145/800105.803400

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.465.1355

S. Cogliani, D. Maimut, D. Naccache, R. P. Do-canto, R. Reyhanitabar et al., OMD: A Compression Function Mode of Operation for Authenticated Encryption, Selected Areas in Cryptography - SAC 2014 -21st International Conference, pp.112-128, 2014.
DOI : 10.1007/978-3-319-13051-4_7

URL : https://hal.archives-ouvertes.fr/hal-01098397

J. Daemen and V. Rijmen, Probability distributions of correlation and differentials in block ciphers, Journal of Mathematical Cryptology, vol.1, issue.3, pp.221-242, 2007.
DOI : 10.1515/JMC.2007.011

I. Damgård, J. Funder, J. B. Nielsen, and L. Salvail, Superposition Attacks on Cryptographic Protocols, ) Information Theoretic Security -7th International Conference, ICITS 2013, pp.142-161, 2013.
DOI : 10.1007/978-3-319-04268-8_9

M. Dworkin, Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication. NIST Special Publication 800-38B, National Institute for Standards and Technology, 2005.

S. Even and Y. Mansour, A construction of a cipher from a single pseudorandom permutation, Journal of Cryptology, vol.28, issue.No. 2, pp.151-162, 1997.
DOI : 10.1007/s001459900025

T. Gagliardoni, A. Hülsing, and C. Schaffner, Semantic Security and Indistinguishability in the Quantum World, 2015.
DOI : 10.1007/978-3-662-53015-3_3

L. K. Grover, A fast quantum mechanical algorithm for database search, Proceedings of the twenty-eighth annual ACM symposium on Theory of computing , STOC '96, pp.212-219, 1996.
DOI : 10.1145/237814.237866

V. T. Hoang, T. Krovetz, and P. Rogaway, Robust Authenticated-Encryption AEZ and the Problem That It Solves, Advances in Cryptology -EUROCRYPT 2015 -34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.15-44, 2015.
DOI : 10.1007/978-3-662-46800-5_2

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.691.932

T. Iwata and K. Kurosawa, OMAC: one-key CBC MAC Fast Software Encryption, Lecture Notes in Computer Science, vol.10, issue.2887, pp.129-153, 2003.
DOI : 10.1007/978-3-540-39887-5_11

T. Iwata, K. Minematsu, J. Guo, and S. Morioka, CLOC: Authenticated Encryption for Short Input, Fast Software Encryption -21st International Workshop, FSE 2014, pp.149-167, 2014.
DOI : 10.1007/978-3-662-46706-0_8

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.431.1635

M. Kaplan, Quantum attacks against iterated block ciphers, p.1434, 1410.

M. Kaplan, G. Leurent, A. Leverrier, and M. Naya-plasencia, Quantum differential and linear cryptanalysis, p.5836, 1510.
URL : https://hal.archives-ouvertes.fr/hal-01237242

T. Krovetz and P. Rogaway, The Software Performance of Authenticated-Encryption Modes, Lecture Notes in Computer Science, vol.8, issue.2, pp.306-327, 2011.
DOI : 10.1006/ffta.2001.0339

H. Kuwakado and M. Morii, Quantum distinguisher between the 3-round Feistel cipher and the random permutation, 2010 IEEE International Symposium on Information Theory, pp.2682-2685, 2010.
DOI : 10.1109/ISIT.2010.5513654

H. Kuwakado and M. Morii, Security on the quantum-type Even-Mansour cipher, Information Theory and its Applications (ISITA), 2012 International Symposium on, pp.312-316, 2012.

M. Liskov, R. L. Rivest, and D. Wagner, Tweakable Block Ciphers, Journal of Cryptology, vol.12, issue.11, pp.588-613, 2011.
DOI : 10.1007/s00145-010-9073-y

M. Luby and C. Rackoff, How to Construct Pseudorandom Permutations from Pseudorandom Functions, SIAM Journal on Computing, vol.17, issue.2, pp.373-386, 1988.
DOI : 10.1137/0217022

L. Lydersen, C. Wiechers, C. Wittmann, D. Elser, J. Skaar et al., Hacking commercial quantum cryptography systems by tailored bright illumination, Nature Photonics, vol.46, issue.10, pp.686-689, 2010.
DOI : 10.1038/nphoton.2010.214

URL : http://arxiv.org/abs/1008.4593

D. A. Mcgrew and J. Viega, The Security and Performance of the Galois/Counter Mode (GCM) of Operation, Progress in Cryptology -INDOCRYPT 2004, 5th International Conference on Cryptology in India, pp.343-355, 2004.
DOI : 10.1007/978-3-540-30556-9_27

K. Minematsu, Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions, Advances in Cryptology - EUROCRYPT 2014 -33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.275-292, 2014.
DOI : 10.1007/978-3-642-55220-5_16

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.431.9300

A. Montanaro and R. De-wolf, A survey of quantum property testing. arXiv preprint, 2013.

P. Rogaway, Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC, 10th International Conference on the Theory and Application of Cryptology and Information Security, pp.16-31, 2004.
DOI : 10.1007/978-3-540-30539-2_2

P. Rogaway, M. Bellare, J. Black, and T. Krovetz, OCB: a block-cipher mode of operation for efficient authenticated encryption, Proceedings of the 8th ACM Conference on Computer and Communications Security, pp.196-205, 2001.

T. Santoli and C. Schaffner, Using simon's algorithm to attack symmetric-key cryptographic primitives, 2016.

P. W. Shor, Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer, SIAM Journal on Computing, vol.26, issue.5, pp.1484-1509, 1997.
DOI : 10.1137/S0097539795293172

D. R. Simon, On the Power of Quantum Computation, SIAM Journal on Computing, vol.26, issue.5, pp.1474-1483, 1997.
DOI : 10.1137/S0097539796298637

D. Unruh, Non-Interactive Zero-Knowledge Proofs in the Quantum Random Oracle Model, Eurocrypt 2015, pp.755-784587, 2015.
DOI : 10.1007/978-3-662-46803-6_25

F. Xu, B. Qi, and H. K. Lo, Experimental demonstration of phase-remapping attack in a practical quantum key distribution system, New Journal of Physics, vol.12, issue.11, p.113026, 2010.
DOI : 10.1088/1367-2630/12/11/113026

G. Yuval, Reinventing the travois: Encryption/MAC in 30 ROM bytes, Fast Software Encryption, 4th International Workshop, FSE '97, pp.205-209, 1997.
DOI : 10.1007/BFb0052347

M. Zhandry, How to Construct Quantum Random Functions, 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science, pp.679-687, 2012.
DOI : 10.1109/FOCS.2012.37

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.359.3667

M. Zhandry, Secure identity-based encryption in the quantum random oracle model, International Journal of Quantum Information, vol.13, issue.04, p.1550014, 2015.
DOI : 10.1142/S0219749915500148

Y. Zhao, C. H. Fung, B. Qi, C. Chen, and H. K. Lo, Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems, Physical Review A, vol.78, issue.4, p.42333, 2008.
DOI : 10.1103/PhysRevA.78.042333