We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 520 results
  1. Exact distributed quantum algorithm for generalized Simon’s problem

    Simon’s problem is one of the most important problems demonstrating the power of quantum algorithms, as it greatly inspired the proposal of Shor’s...

    Hao Li, Daowen Qiu, ... Paulo Mateus in Acta Informatica
    Article 10 March 2024
  2. Quantum Attacks: A View of Data Complexity on Offline Simon’s Algorithm

    Simon’s algorithm has shown a threat to block ciphers in the quantum setting, especially accelerating attacks with superposition queries. Sometimes...
    Bo Yu, Tairong Shi, ... Bing Sun in Information Security and Cryptology
    Conference paper 2024
  3. Breaking tweakable enciphering schemes using Simon’s algorithm

    We show the applicability of Simon’s period finding quantum algorithm to the cryptanalysis of several tweakable enciphering schemes (TESs), namely,...

    Sebati Ghosh, Palash Sarkar in Designs, Codes and Cryptography
    Article 27 May 2021
  4. On the Simon’s Congruence Neighborhood of Languages

    Given an integer k, Simon’s congruence relation says that two strings u and v are...
    Sungmin Kim, Yo-Sub Han, ... Kai Salomaa in Developments in Language Theory
    Conference paper 2023
  5. Simon’s Algorithm and Symmetric Crypto: Generalizations and Automatized Applications

    In this paper we deepen our understanding of how to apply Simon’s algorithm to break symmetric cryptographic primitives. On the one hand, we automate...
    Federico Canale, Gregor Leander, Lukas Stennes in Advances in Cryptology – CRYPTO 2022
    Conference paper 2022
  6. Tight Bounds for Simon’s Algorithm

    Simon’s algorithm is the first example of a quantum algorithm exponentially faster than any classical algorithm, and has many applications in...
    Conference paper 2021
  7. Matching Patterns with Variables Under Simon’s Congruence

    We introduce and investigate a series of matching problems for patterns with variables under Simon’s congruence. Our results provide a thorough...
    Pamela Fleischmann, Sungmin Kim, ... Max Wiedenhöft in Reachability Problems
    Conference paper 2023
  8. On Simon’s Congruence Closure of a String

    Two strings are Simon’s \(\sim _k\) -congruent if they have...
    Sungmin Kim, Yo-Sub Han, ... Kai Salomaa in Descriptional Complexity of Formal Systems
    Conference paper 2022
  9. Simon’s Algorithm and Autocorrelation Spectrum

    Simon’s algorithm is another important evidence that more efficient evaluations of certain properties are possible in quantum domain over the...
    Tharrmashastha SAPV, Debajyoti Bera, ... Subhamoy Maitra in Quantum Algorithms for Cryptographically Significant Boolean Functions
    Chapter 2021
  10. Quantum Advantage with Deutsch-Jozsa, Bernstein-Vazirani, and Simon’s Algorithms

    In this chapter, we study three algorithms of little practical use but important because they were the first to show that quantum computers can solve...
    Vladimir Silva in Quantum Computing by Practice
    Chapter 2024
  11. Nearly k-Universal Words - Investigating a Part of Simon’s Congruence

    Determining the index of Simon’s congruence is a long outstanding open problem. Two words u and v are called Simon congruent if they have the same...
    Pamela Fleischmann, Lukas Haschke, ... Dirk Nowotka in Descriptional Complexity of Formal Systems
    Conference paper 2022
  12. \(\alpha \) - \(\beta \) -Factorization and the Binary Case of Simon’s Congruence

    In 1991 Hébrard introduced a factorization of words that turned out to be a powerful tool for the investigation of a word’s scattered factors (also...
    Pamela Fleischmann, Jonas Höfer, ... Dirk Nowotka in Fundamentals of Computation Theory
    Conference paper 2023
  13. Quantum cryptanalysis of Farfalle and (generalised) key-alternating Feistel networks

    Farfalle is a permutation-based construction for building a pseudorandom function which has been proposed by Bertoni et al. in 2017. In this work, we...

    S. Hodžić, A. Roy, E. Andreeva in Designs, Codes and Cryptography
    Article 12 October 2023
  14. Post-quantum security on the Lai–Massey scheme

    Post-quantum cryptography has attracted much attention from worldwide cryptologists. A growing number of symmetric cryptography algorithms have been...

    Zhongya Zhang, Wenling Wu, ... Bolin Wang in Designs, Codes and Cryptography
    Article 29 April 2023
  15. Analysis of Quantum Cryptology and the RSA Algorithms Defense Against Attacks Using Shor’s Algorithm in a Post Quantum Environment

    Over the course of the previous twenty years, quantum cryptanalysis has become an important topic of research. The development of two well-known...
    Conference paper 2024
  16. Quantum Algorithm for Finding Impossible Differentials and Zero-Correlation Linear Hulls of Symmetric Ciphers

    In this paper, we present quantum algorithms for finding impossible differentials and zero-correlation linear hulls, which are distinguishers for the...
    Huiqin Chen, Yongqiang Li, ... Mingsheng Wang in Information Security and Privacy
    Conference paper 2023
  17. Quantum Speed-Up for Multidimensional (Zero Correlation) Linear Distinguishers

    This paper shows how to achieve a quantum speed-up for multidimensional (zero correlation) linear distinguishers. A previous work by Kaplan et...
    Conference paper 2023
  18. On the Piecewise Complexity of Words and Periodic Words

    The piecewise complexity h(u) of a word is the minimal length of subwords needed to exactly characterise u. Its piecewise minimality index...
    M. Praveen, Ph. Schnoebelen, ... I. Vialard in SOFSEM 2024: Theory and Practice of Computer Science
    Conference paper 2024
  19. Informational Equivalence but Computational Differences? Herbert Simon on Representations in Scientific Practice

    To explain why, in scientific problem solving, a diagram can be “worth ten thousand words,” Jill Larkin and Herbert Simon (1987) relied on a computer...

    David Waszek in Minds and Machines
    Article 17 March 2023
  20. Quantum Attacks on Lai-Massey Structure

    Aaram Yun et al. considered that Lai-Massey structure has the same security as Feistel structure. However, Luo et al. showed that 3-round Lai-Massey...
    Shu** Mao, Tingting Guo, ... Lei Hu in Post-Quantum Cryptography
    Conference paper 2022
Did you find what you were looking for? Share feedback.