Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts, LNCS, vol.10212, issue.3, pp.65-93, 2017. ,
Block ciphers-focus on the linear layer (feat. PRIDE), CRYPTO 2014, vol.8616, pp.57-76, 2014. ,
Post-Quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of Operation, PostQuantum Cryptography-7th International Workshop, vol.9606, pp.44-63, 2016. ,
Extended generalized feistel networks using matrix representation to propose a new lightweight block cipher: Lilliput, IEEE Trans. Computers, vol.65, issue.7, pp.2074-2089, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01298151
, The Poly1305-AES Message-Authentication Code. In: FSE. LNCS, vol.3557, pp.32-49, 2005.
The salsa20 family of stream ciphers, New Stream Cipher Designs-The eSTREAM Finalists, vol.4986, pp.84-97, 2008. ,
Post-quantum cryptography, Nature, vol.549, issue.7671, pp.188-194, 2017. ,
Random Oracles in a Quantum World, Advances in Cryptology-ASIACRYPT 2011, vol.7073, pp.41-69, 2011. ,
Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World, Advances in Cryptology-CRYPTO 2013-33rd ,
, Proceedings, Part II, pp.361-379, 2013.
Quantum key-recovery on full AEZ, Selected Areas in Cryptography-SAC 2017-24th International Conference, vol.10719, pp.394-406, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01650026
PRINCE-A low-latency block cipher for pervasive computing applications-extended abstract, Asiacrypt 2012, vol.7658, pp.208-225, 2012. ,
Merkle puzzles in a quantum world, Advances in Cryptology-CRYPTO 2011, pp.391-410, 2011. ,
Quantum Algorithm for the Collision Problem, 2016. ,
Csidh: An efficient post-quantum commutative group action. Cryptology ePrint Archive, vol.383, 2018. ,
An efficient quantum collision search algorithm and implications on symmetric cryptography 10625, pp.211-240, 2017. ,
Constructing elliptic curve isogenies in quantum subexponential time, J. Mathematical Cryptology, vol.8, issue.1, pp.1-29, 2014. ,
The Design of Rijndael: AES-The Advanced Encryption Standard. Information Security and Cryptography, 2002. ,
Superposition Attacks on Cryptographic Protocols, Information Theoretic Security-7th International Conference, vol.8317, pp.142-161, 2013. ,
On Quantum Algorithms for Noncommutative Hidden Subgroups, STACS 99, 16th Annual Symposium on Theoretical Aspects of Computer Science, vol.1563, pp.478-487, 1999. ,
, The skein hask function family, 2010.
Random Mapping Statistics, Advances in Cryptology-EUROCRYPT '89, Workshop on the Theory and Application of of Cryptographic Techniques, vol.434, pp.329-354, 1989. ,
URL : https://hal.archives-ouvertes.fr/inria-00075445
Quantum Security of Cryptographic Primitives, 2017. ,
Semantic Security and Indistinguishability in the Quantum World, Advances in Cryptology-CRYPTO 2016-36th Annual International Cryptology Conference, vol.9816, pp.60-89, 2016. ,
Quantum multicollision-finding algorithm, Advances in Cryptology-ASIACRYPT 2017-23rd International Conference on the Theory and Applications of Cryptology and Information Security, vol.10625, pp.179-210, 2017. ,
Quantum attacks against iterated block ciphers, 2014. ,
Breaking Symmetric Cryptosystems Using Quantum Period Finding, Advances in Cryptology-CRYPTO 2016-36th Annual International Cryptology Conference, vol.9815, pp.207-237, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01404196
, Quantum Differential and Linear Cryptanalysis, vol.2016, pp.71-94, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01652807
How to Protect DES Against Exhaustive Key Search, LNCS, vol.1109, pp.252-267, 1996. ,
A Subexponential-Time Quantum Algorithm for the Dihedral Hidden Subgroup Problem, SIAM J. Comput, vol.35, issue.1, pp.170-188, 2005. ,
, 8th Conference on the Theory of Quantum Computation, Communication and Cryptography, TQC 2013, vol.22, pp.20-34, 2013.
Quantum distinguisher between the 3-round Feistel cipher and the random permutation, Information Theory Proceedings (ISIT), 2010 IEEE International Symposium on, pp.2682-2685, 2010. ,
Security on the quantum-type Even-Mansour cipher, Information Theory and its Applications (ISITA), 2012 International Symposium on, pp.312-316, 2012. ,
, chacha20-poly1305 cipher suites for transport layer security (tls)". In: RFC 7905, 2016.
, Advances in Cryptology-ASIACRYPT 2017-23rd International Conference on the Theory and Applications of Cryptology and Information Security, vol.10625, pp.161-178, 2017.
Hacking commercial quantum cryptography systems by tailored bright illumination, Nature photonics, vol.4, issue.10, pp.686-689, 2010. ,
A Subexponential Time Algorithm for the Dihedral Hidden Subgroup Problem with Polynomial Space, 2004. ,
, AES Candidate Conference, pp.337-342, 2000.
A note on quantum related-key attacks, Information Processing Letters, vol.115, issue.1, pp.40-44, 2015. ,
Using Simon's Algorithm to Attack Symmetric-Key Cryptographic Primitives, 2016. ,
On the Power of Quantum Cryptography, 35th Annual Symposium on Foundations of Computer Science, pp.116-123, 1994. ,
Quantum security of NMAC and related constructions-PRF domain extension against quantum attacks, Advances in Cryptology-CRYPTO 2017-37th Annual International Cryptology Conference, vol.10402, pp.283-309, 2017. ,
, Federal Information Processing StandardCryptographic Protection-Cryptographic Algorithm, pp.28147-89, 1989.
$\textnormal{\textsc{TWINE}}$ : A lightweight block cipher for multiple platforms, Selected Areas in Cryptography, 19th International Conference, SAC 2012, vol.7707, pp.339-354, 2012. ,
Non-interactive zero-knowledge proofs in the quantum random oracle model, Eurocrypt 2015, vol.9057, pp.755-784, 2015. ,
Experimental demonstration of phase-remapping attack in a practical quantum key distribution system, New Journal of Physics, vol.12, issue.11, p.113026, 2010. ,
, , 1997.
, How to Construct Quantum Random Functions. In: 53rd Annual IEEE Symposium on Foundations of Computer Science, FOCS 2012, pp.679-687, 2012.
Secure identity-based encryption in the quantum random oracle model, International Journal of Quantum Information, vol.13, issue.04, p.1550014, 2015. ,
Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems, Physical Review A, vol.78, issue.4, p.42333, 2008. ,