Author:
Martin Daniel P.,Montanaro Ashley,Oswald Elisabeth,Shepherd Dan
Publisher
Springer International Publishing
Reference26 articles.
1. Anand, M.V., Targhi, E.E., Tabia, G.N., Unruh, D.: Post-quantum security of the CBC, CFB, OFB, CTR, and XTS modes of operation. Cryptology ePrint Archive, Report 2016/197 (2016). http://eprint.iacr.org/2016/197
2. Bentley, J.L., Yao, A.C.-C.: An almost optimal algorithm for unbounded searching. Inf. Proces. Lett. 5(3), 82–87 (1976)
3. Bernstein, D.J., Lange, T., van Vredendaal, C.: Tighter, faster, simpler side-channel security evaluations beyond computing power. Cryptology ePrint Archive, Report 2015/221 (2015). http://eprint.iacr.org/2015/221
4. Lecture Notes in Computer Science;A Bogdanov,2016
5. Brassard, G., Hoyer, P., Mosca, M., Tapp, A.: Quantum amplitude amplification and estimation. Contemp. Mathe. 305, 53–74 (2002)
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. On recovering block cipher secret keys in the cold boot attack setting;Cryptography and Communications;2023-02-13
2. Key Enumeration;Encyclopedia of Cryptography, Security and Privacy;2023
3. Quantum and Post-Quantum Cybersecurity Challenges and Finance Organizations Readiness;Handbook of Research on Cybersecurity Issues and Challenges for Business and FinTech Applications;2022-10-21
4. Rank estimation with bounded error via exponential sampling;Journal of Cryptographic Engineering;2021-08-04
5. Physical security in the post-quantum era;Journal of Cryptographic Engineering;2021-02-01