Quantum Walk Algorithm for Element Distinctness, SIAM J. Comput, vol.37, issue.1, pp.210-239, 2007. ,
Post-quantum security of the CBC, CFB, OFB, CTR, and XTS modes of operation, PQCrypto, vol.9606, pp.44-63, 2016. ,
Low-communication parallel quantum multi-target preimage search, Selected Areas in Cryptography -SAC 2017, vol.10719, pp.325-335, 2018. ,
Low-data complexity attacks on AES, IEEE Trans. Information Theory, vol.58, issue.11, pp.7002-7017, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-01111659
Quantum amplitude amplification and estimation, Contemporary Mathematics, vol.305, pp.53-74, 2002. ,
Quantum cryptanalysis of hash and claw-free functions, LATIN, vol.1380, pp.163-169, 1998. ,
Biclique cryptanalysis of the full AES, Advances in Cryptology -ASIACRYPT 2011, vol.7073, pp.344-371, 2011. ,
On the practical (in-)security of 64-bit block ciphers: Collision attacks on HTTP over TLS and openvpn, ACM Conference on Computer and Communications Security, pp.456-467, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01404208
Making the impossible possible, J. Cryptology, vol.31, issue.1, pp.101-133, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01953916
Scrutinizing and improving impossible differential attacks: Applications to CLEFIA, Camellia, LBlock and Simon, Advances in Cryptology -ASIACRYPT 2014. Proceedings, Part I, vol.8873, pp.179-199, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01068894
On quantum slide attacks, IACR Cryptology ePrint Archive, p.1067, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01946399
Quantum key-recovery on full AEZ, Selected Areas in Cryptography -SAC 2017, vol.10719, pp.394-406, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01650026
Secure signatures and chosen ciphertext security in a quantum computing world, CRYPTO, vol.8043, pp.361-379, 2013. ,
Theory of quantum computation, communication, and cryptography. chapter On the Design and Optimization of a Quantum Polynomial-Time Attack on Elliptic Curve Cryptography, pp.96-104, 2008. ,
An efficient quantum collision search algorithm and implications on symmetric cryptography, ASIACRYPT, vol.10625, pp.211-240, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01651007
Improved key recovery attacks on reduced-round AES in the single-key setting, Advances in Cryptology -EUROCRYPT 2013. Proceedings, vol.7881, pp.371-387, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-01094304
The block cipher Square, FSE, vol.1267, pp.149-165, 1997. ,
Improved single-key attacks on 8-round AES-192 and AES-256, Advances in Cryptology -ASIACRYPT 2010 -16th International Conference on the Theory and Application of Cryptology and Information Security, vol.6477, pp.158-176, 2010. ,
AES proposal: Rijndael, 1999. ,
On the related-key attacks against AES, Proceedings of the Romanian Academy, Series A, vol.13, issue.4, pp.395-400, 2012. ,
A meet-in-the-middle attack on 8-round AES, FSE, vol.5086, pp.116-126, 2008. ,
Improved cryptanalysis of Rijndael, FSE, vol.1978, pp.213-230, 2000. ,
Semantic security and indistinguishability in the quantum world, Annual Cryptology Conference, pp.60-89, 2016. ,
Applying Grover's Algorithm to AES: Quantum Resource Estimates, PQCrypto, vol.9606, pp.29-43, 2016. ,
A Fast Quantum Mechanical Algorithm for Database Search, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, pp.212-219, 1996. ,
Quantum Demirci-Selçuk Meet-in-the-Middle Attacks: Applications to 6-Round Generic Feistel Constructions, SCN, vol.11035, pp.386-403, 2018. ,
Quantum multicollisionfinding algorithm, ASIACRYPT, vol.10625, pp.179-210, 2017. ,
TikZ for Cryptographers, 2016. ,
Quantum attacks against iterated block ciphers, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-02287070
Breaking symmetric cryptosystems using quantum period finding, CRYPTO, vol.9815, pp.207-237, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01404196
Quantum differential and linear cryptanalysis, IACR Trans. Symmetric Cryptol, vol.2016, issue.1, pp.71-94, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01652807
Quantum distinguisher between the 3-round feistel cipher and the random permutation, IEEE International Symposium on Information Theory, ISIT 2010, Proceedings, pp.2682-2685, 2010. ,
Security on the quantum-type even-mansour cipher, Proceedings of the International Symposium on Information Theory and its Applications, ISITA 2012, pp.312-316, 2012. ,
Classical and Quantum Computation, 2002. ,
Grover Meets Simon -Quantumly Attacking the FX-construction, Advances in Cryptology -ASIACRYPT 2017, Proceedings, Part II, vol.10625, pp.161-178, 2017. ,
The missing difference problem, and its applications to counter mode encryption, EUROCRYPT, vol.10821, pp.745-770, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01953390
NISTIR 8114 report on lightweight cryptography, 2017. ,
Quantum key search with side channel advice, Selected Areas in Cryptography -SAC 2017, vol.10719, pp.407-422, 2018. ,
Quantum computation and quantum information, 2002. ,
China Office of State Commercial Cryptography Administration. The SMS4 block cipher ,
The AES-256 cryptosystem resists quantum attacks, vol.8, pp.404-408, 2017. ,
A note on quantum related-key attacks, Inf. Process. Lett, vol.115, issue.1, pp.40-44, 2015. ,
Algorithms for quantum computation: Discrete logarithms and factoring, 35th Annual Symposium on Foundations of Computer Science, pp.124-134, 1994. ,
On the power of quantum computation, SIAM J. Comput, vol.26, issue.5, pp.1474-1483, 1997. ,