A. Ambainis, Quantum Walk Algorithm for Element Distinctness, SIAM J. Comput, vol.37, issue.1, pp.210-239, 2007.

E. E. Mayuresh-vivekanand-anand, G. Targhi, D. Noel-tabia, and . Unruh, Post-quantum security of the CBC, CFB, OFB, CTR, and XTS modes of operation, PQCrypto, vol.9606, pp.44-63, 2016.

G. Banegas and D. J. Bernstein, Low-communication parallel quantum multi-target preimage search, Selected Areas in Cryptography -SAC 2017, vol.10719, pp.325-335, 2018.

C. Bouillaguet, P. Derbez, O. Dunkelman, P. Fouque, N. Keller et al., Low-data complexity attacks on AES, IEEE Trans. Information Theory, vol.58, issue.11, pp.7002-7017, 2012.
URL : https://hal.archives-ouvertes.fr/hal-01111659

G. Brassard, P. Hoyer, M. Mosca, and A. Tapp, Quantum amplitude amplification and estimation, Contemporary Mathematics, vol.305, pp.53-74, 2002.

G. Brassard, P. Høyer, and A. Tapp, Quantum cryptanalysis of hash and claw-free functions, LATIN, vol.1380, pp.163-169, 1998.

A. Bogdanov, D. Khovratovich, and C. Rechberger, Biclique cryptanalysis of the full AES, Advances in Cryptology -ASIACRYPT 2011, vol.7073, pp.344-371, 2011.

K. Bhargavan and G. Leurent, On the practical (in-)security of 64-bit block ciphers: Collision attacks on HTTP over TLS and openvpn, ACM Conference on Computer and Communications Security, pp.456-467, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01404208

C. Boura, V. Lallemand, M. Naya-plasencia, and V. Suder, Making the impossible possible, J. Cryptology, vol.31, issue.1, pp.101-133, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01953916

C. Boura, M. Naya-plasencia, and V. Suder, Scrutinizing and improving impossible differential attacks: Applications to CLEFIA, Camellia, LBlock and Simon, Advances in Cryptology -ASIACRYPT 2014. Proceedings, Part I, vol.8873, pp.179-199, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01068894

X. Bonnetain, M. Naya-plasencia, and A. Schrottenloher, On quantum slide attacks, IACR Cryptology ePrint Archive, p.1067, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01946399

X. Bonnetain, Quantum key-recovery on full AEZ, Selected Areas in Cryptography -SAC 2017, vol.10719, pp.394-406, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01650026

D. Boneh and M. Zhandry, Secure signatures and chosen ciphertext security in a quantum computing world, CRYPTO, vol.8043, pp.361-379, 2013.

D. Cheung, D. Maslov, J. Mathew, and D. K. Pradhan, Theory of quantum computation, communication, and cryptography. chapter On the Design and Optimization of a Quantum Polynomial-Time Attack on Elliptic Curve Cryptography, pp.96-104, 2008.

A. Chailloux, M. Naya-plasencia, and A. Schrottenloher, An efficient quantum collision search algorithm and implications on symmetric cryptography, ASIACRYPT, vol.10625, pp.211-240, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01651007

P. Derbez, P. Fouque, and J. Jean, Improved key recovery attacks on reduced-round AES in the single-key setting, Advances in Cryptology -EUROCRYPT 2013. Proceedings, vol.7881, pp.371-387, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01094304

J. Daemen, L. R. Knudsen, and V. Rijmen, The block cipher Square, FSE, vol.1267, pp.149-165, 1997.

O. Dunkelman, N. Keller, and A. Shamir, Improved single-key attacks on 8-round AES-192 and AES-256, Advances in Cryptology -ASIACRYPT 2010 -16th International Conference on the Theory and Application of Cryptology and Information Security, vol.6477, pp.158-176, 2010.

J. Daemen and V. Rijmen, AES proposal: Rijndael, 1999.

J. Daemen and V. Rijmen, On the related-key attacks against AES, Proceedings of the Romanian Academy, Series A, vol.13, issue.4, pp.395-400, 2012.

H. Demirci and A. Selçuk, A meet-in-the-middle attack on 8-round AES, FSE, vol.5086, pp.116-126, 2008.

J. Ferguson, S. Kelsey, B. Lucks, M. Schneier, D. A. Stay et al., Improved cryptanalysis of Rijndael, FSE, vol.1978, pp.213-230, 2000.

T. Gagliardoni, A. Hülsing, and C. Schaffner, Semantic security and indistinguishability in the quantum world, Annual Cryptology Conference, pp.60-89, 2016.

M. Grassl, B. Langenberg, M. Roetteler, and R. Steinwandt, Applying Grover's Algorithm to AES: Quantum Resource Estimates, PQCrypto, vol.9606, pp.29-43, 2016.

K. Lov and . Grover, A Fast Quantum Mechanical Algorithm for Database Search, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, pp.212-219, 1996.

A. Hosoyamada and Y. Sasaki, Quantum Demirci-Selçuk Meet-in-the-Middle Attacks: Applications to 6-Round Generic Feistel Constructions, SCN, vol.11035, pp.386-403, 2018.

A. Hosoyamada, Y. Sasaki, and K. Xagawa, Quantum multicollisionfinding algorithm, ASIACRYPT, vol.10625, pp.179-210, 2017.

J. Jean, TikZ for Cryptographers, 2016.

M. Kaplan, Quantum attacks against iterated block ciphers, 2014.
URL : https://hal.archives-ouvertes.fr/hal-02287070

M. Kaplan, G. Leurent, A. Leverrier, and M. Naya-plasencia, Breaking symmetric cryptosystems using quantum period finding, CRYPTO, vol.9815, pp.207-237, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01404196

M. Kaplan, G. Leurent, A. Leverrier, and M. Naya-plasencia, Quantum differential and linear cryptanalysis, IACR Trans. Symmetric Cryptol, vol.2016, issue.1, pp.71-94, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01652807

H. Kuwakado and M. Morii, Quantum distinguisher between the 3-round feistel cipher and the random permutation, IEEE International Symposium on Information Theory, ISIT 2010, Proceedings, pp.2682-2685, 2010.

H. Kuwakado and M. Morii, Security on the quantum-type even-mansour cipher, Proceedings of the International Symposium on Information Theory and its Applications, ISITA 2012, pp.312-316, 2012.

A. Yu, A. H. Kitaev, M. N. Shen, and . Vyalyi, Classical and Quantum Computation, 2002.

G. Leander and A. May, Grover Meets Simon -Quantumly Attacking the FX-construction, Advances in Cryptology -ASIACRYPT 2017, Proceedings, Part II, vol.10625, pp.161-178, 2017.

G. Leurent and F. Sibleyras, The missing difference problem, and its applications to counter mode encryption, EUROCRYPT, vol.10821, pp.745-770, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01953390

K. A. Mckay, L. Bassham, M. Snmez-turan, and N. Mouha, NISTIR 8114 report on lightweight cryptography, 2017.

D. P. Martin, A. Montanaro, E. Oswald, and D. J. Shepherd, Quantum key search with side channel advice, Selected Areas in Cryptography -SAC 2017, vol.10719, pp.407-422, 2018.

A. Michael, I. Nielsen, and . Chuang, Quantum computation and quantum information, 2002.

P. R. , China Office of State Commercial Cryptography Administration. The SMS4 block cipher

S. Rao, D. Mahto, D. Yadav, and D. Khan, The AES-256 cryptosystem resists quantum attacks, vol.8, pp.404-408, 2017.

M. Rötteler and R. Steinwandt, A note on quantum related-key attacks, Inf. Process. Lett, vol.115, issue.1, pp.40-44, 2015.

W. Peter and . Shor, Algorithms for quantum computation: Discrete logarithms and factoring, 35th Annual Symposium on Foundations of Computer Science, pp.124-134, 1994.

D. R. Simon, On the power of quantum computation, SIAM J. Comput, vol.26, issue.5, pp.1474-1483, 1997.