Pipelineable On-line Encryption, Fast Software Encryption -21st International Workshop, FSE 2014, pp.205-223, 2014. ,
DOI : 10.1007/978-3-662-46706-0_11
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.500.4410
Computational security of quantum encryption. arXiv preprint, 2016. ,
Post-Quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of Operation, Post- Quantum Cryptography -7th International Workshop, pp.44-63, 2016. ,
DOI : 10.1007/978-3-319-29360-8_4
Parallelizable and Authenticated Online Ciphers, Advances in Cryptology -ASIACRYPT 2013 -19th International Conference on the Theory and Application of Cryptology and Information Security Proceedings, Part I. Lecture Notes in Computer Science, pp.424-443, 2013. ,
DOI : 10.1007/978-3-642-42033-7_22
URL : https://lirias.kuleuven.be/bitstream/123456789/417503/2/article-2368.pdf
The Security of the Cipher Block Chaining Message Authentication Code, Journal of Computer and System Sciences, vol.61, issue.3, pp.362-399, 2000. ,
DOI : 10.1006/jcss.1999.1694
Introduction to post-quantum cryptography, pp.1-14, 2009. ,
DOI : 10.1007/978-3-540-88702-7_1
Slide Attacks, Fast Software Encryption, 6th International Workshop, FSE '99, pp.245-259, 1999. ,
DOI : 10.1007/3-540-48519-8_18
Advanced Slide Attacks, International Conference on the Theory and Application of Cryptographic Techniques, pp.589-606, 2000. ,
DOI : 10.1007/3-540-45539-6_41
CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions, 20th Annual International Cryptology Conference, pp.197-215, 2000. ,
DOI : 10.1007/3-540-44598-6_12
A Block-Cipher Mode of Operation for Parallelizable Message Authentication, Advances in Cryptology -EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, pp.384-397, 2002. ,
DOI : 10.1007/3-540-46035-7_25
Random Oracles in a Quantum World, Advances in Cryptology ? ASIACRYPT 2011, pp.41-69, 2011. ,
DOI : 10.1007/978-3-642-25385-0_3
Quantum-Secure Message Authentication Codes, Advances in Cryptology -EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.592-608, 2013. ,
DOI : 10.1007/978-3-642-38348-9_35
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.248.4295
Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World, Advances in Cryptology - CRYPTO 2013 -33rd Annual Cryptology Conference Proceedings, Part II, pp.361-379, 2013. ,
DOI : 10.1007/978-3-642-40084-1_21
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.6049
Merkle Puzzles in a Quantum World, Advances in Cryptology?CRYPTO 2011, pp.391-410, 2011. ,
DOI : 10.1007/978-3-642-22792-9_22
Quantum homomorphic encryption for circuits of low Tgate complexity, Advances in Cryptology?CRYPTO 2015, pp.609-629, 2015. ,
Universal classes of hash functions (Extended Abstract), Proceedings of the ninth annual ACM symposium on Theory of computing , STOC '77 ,
DOI : 10.1145/800105.803400
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.465.1355
OMD: A Compression Function Mode of Operation for Authenticated Encryption, Selected Areas in Cryptography - SAC 2014 -21st International Conference, pp.112-128, 2014. ,
DOI : 10.1007/978-3-319-13051-4_7
URL : https://hal.archives-ouvertes.fr/hal-01098397
Probability distributions of correlation and differentials in block ciphers, Journal of Mathematical Cryptology, vol.1, issue.3, pp.221-242, 2007. ,
DOI : 10.1515/JMC.2007.011
Superposition Attacks on Cryptographic Protocols, ) Information Theoretic Security -7th International Conference, ICITS 2013, pp.142-161, 2013. ,
DOI : 10.1007/978-3-319-04268-8_9
Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication. NIST Special Publication 800-38B, National Institute for Standards and Technology, 2005. ,
A construction of a cipher from a single pseudorandom permutation, Journal of Cryptology, vol.28, issue.No. 2, pp.151-162, 1997. ,
DOI : 10.1007/s001459900025
Semantic Security and Indistinguishability in the Quantum World, 2015. ,
DOI : 10.1007/978-3-662-53015-3_3
A fast quantum mechanical algorithm for database search, Proceedings of the twenty-eighth annual ACM symposium on Theory of computing , STOC '96, pp.212-219, 1996. ,
DOI : 10.1145/237814.237866
Robust Authenticated-Encryption AEZ and the Problem That It Solves, Advances in Cryptology -EUROCRYPT 2015 -34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.15-44, 2015. ,
DOI : 10.1007/978-3-662-46800-5_2
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.691.932
OMAC: one-key CBC MAC Fast Software Encryption, Lecture Notes in Computer Science, vol.10, issue.2887, pp.129-153, 2003. ,
DOI : 10.1007/978-3-540-39887-5_11
CLOC: Authenticated Encryption for Short Input, Fast Software Encryption -21st International Workshop, FSE 2014, pp.149-167, 2014. ,
DOI : 10.1007/978-3-662-46706-0_8
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.431.1635
Quantum attacks against iterated block ciphers, p.1434, 1410. ,
Quantum differential and linear cryptanalysis, p.5836, 1510. ,
URL : https://hal.archives-ouvertes.fr/hal-01237242
The Software Performance of Authenticated-Encryption Modes, Lecture Notes in Computer Science, vol.8, issue.2, pp.306-327, 2011. ,
DOI : 10.1006/ffta.2001.0339
Quantum distinguisher between the 3-round Feistel cipher and the random permutation, 2010 IEEE International Symposium on Information Theory, pp.2682-2685, 2010. ,
DOI : 10.1109/ISIT.2010.5513654
Security on the quantum-type Even-Mansour cipher, Information Theory and its Applications (ISITA), 2012 International Symposium on, pp.312-316, 2012. ,
Tweakable Block Ciphers, Journal of Cryptology, vol.12, issue.11, pp.588-613, 2011. ,
DOI : 10.1007/s00145-010-9073-y
How to Construct Pseudorandom Permutations from Pseudorandom Functions, SIAM Journal on Computing, vol.17, issue.2, pp.373-386, 1988. ,
DOI : 10.1137/0217022
Hacking commercial quantum cryptography systems by tailored bright illumination, Nature Photonics, vol.46, issue.10, pp.686-689, 2010. ,
DOI : 10.1038/nphoton.2010.214
URL : http://arxiv.org/abs/1008.4593
The Security and Performance of the Galois/Counter Mode (GCM) of Operation, Progress in Cryptology -INDOCRYPT 2004, 5th International Conference on Cryptology in India, pp.343-355, 2004. ,
DOI : 10.1007/978-3-540-30556-9_27
Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions, Advances in Cryptology - EUROCRYPT 2014 -33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.275-292, 2014. ,
DOI : 10.1007/978-3-642-55220-5_16
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.431.9300
A survey of quantum property testing. arXiv preprint, 2013. ,
Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC, 10th International Conference on the Theory and Application of Cryptology and Information Security, pp.16-31, 2004. ,
DOI : 10.1007/978-3-540-30539-2_2
OCB: a block-cipher mode of operation for efficient authenticated encryption, Proceedings of the 8th ACM Conference on Computer and Communications Security, pp.196-205, 2001. ,
Using simon's algorithm to attack symmetric-key cryptographic primitives, 2016. ,
Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer, SIAM Journal on Computing, vol.26, issue.5, pp.1484-1509, 1997. ,
DOI : 10.1137/S0097539795293172
On the Power of Quantum Computation, SIAM Journal on Computing, vol.26, issue.5, pp.1474-1483, 1997. ,
DOI : 10.1137/S0097539796298637
Non-Interactive Zero-Knowledge Proofs in the Quantum Random Oracle Model, Eurocrypt 2015, pp.755-784587, 2015. ,
DOI : 10.1007/978-3-662-46803-6_25
Experimental demonstration of phase-remapping attack in a practical quantum key distribution system, New Journal of Physics, vol.12, issue.11, p.113026, 2010. ,
DOI : 10.1088/1367-2630/12/11/113026
Reinventing the travois: Encryption/MAC in 30 ROM bytes, Fast Software Encryption, 4th International Workshop, FSE '97, pp.205-209, 1997. ,
DOI : 10.1007/BFb0052347
How to Construct Quantum Random Functions, 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science, pp.679-687, 2012. ,
DOI : 10.1109/FOCS.2012.37
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.359.3667
Secure identity-based encryption in the quantum random oracle model, International Journal of Quantum Information, vol.13, issue.04, p.1550014, 2015. ,
DOI : 10.1142/S0219749915500148
Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems, Physical Review A, vol.78, issue.4, p.42333, 2008. ,
DOI : 10.1103/PhysRevA.78.042333