Subject
Applied Mathematics,Industrial and Manufacturing Engineering
Reference34 articles.
1. GOST (State Standard) R
34.12—2015. Information technology. Cryptographic protection of information. Block
ciphers. Enacted on January 1, 2016 (Standartinform, Moscow, 2015).
2. D. V. Denisenko, G. B. Marshalko, M. V. Nikitenkova, V. I. Rudskoi, and V.
A. Shishkin, “Estimating the complexity of Grover’s algorithm for key search of block ciphers
defined by GOST R 34.12-2015,” J. Exp. Theor. Phys. 128, 552–559 (2019).
3. M. Grassl, B. Langenberg, M. Roetteler, and R. Steinwandt, “Applying
Grover’s algorithm to AES: Quantum resource estimates,” in Vol. 9606 of Lect. Notes Comput. Sci.—Post-Quantum Cryptogr. Proc.
7th Int. Workshop (Fukuoka, Japan, February 24–26, 2016) (Springer, Cham, 2016)
29–43.
4. S. Jaques, M. Naehrig, M. Roetteler, and F. Virdia, “Implementing Grover
oracles for quantum key search on AES and LowMC,” in Vol. 12106
of Lect. Notes Comput. Sci. Adv. Cryptol.—EUROCRYPT 2020. Proc. 39th Annu. Int.
Conf. Theory Appl. Cryptogr. Tech. Pt. II (Zagreb, Croatia, May 10–14, 2020)
(Springer, Cham, 2020), 280–310.
5. B. Langenberg, H. Pham, and R. Steinwandt, “Reducing the cost of
implementing the advanced encryption standard as a quantum circuit,” IEEE Trans. Quantum
Eng. 1, 1–12 (2020).