G. Alagic and A. Russell, Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts, p.1187, 1610.
DOI : 10.1007/978-3-642-32009-5_44

M. V. Anand, E. E. Targhi, G. N. Tabia, and D. Unruh, Post-Quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of Operation, pp.44-63
DOI : 10.1007/978-3-319-29360-8_4

D. J. Bernstein, D. Hopwood, A. Hülsing, T. Lange, R. Niederhagen et al., SPHINCS: Practical Stateless Hash-Based Signatures, pp.368-397
DOI : 10.1007/978-3-662-46800-5_15

URL : http://eprint.iacr.org/2014/795.pdf

C. Chaigneau, T. Fuhr, H. Gilbert, J. Jean, and J. R. Reinhard, Cryptanalysis of NORX v2.0, IACR Trans. Symmetric Cryptol, vol.2017, issue.1, pp.156-174, 2017.

C. Chaigneau and H. Gilbert, Is AEZ v4.1 Sufficiently Resilient Against Key- Recovery Attacks?, IACR Trans. Symmetric Cryptol, vol.1, issue.1, pp.114-133, 2016.

J. Daemen and V. Rijmen, The Design of Rijndael: AES -The Advanced Encryption Standard, Information Security and Cryptography, 2002.
DOI : 10.1007/978-3-662-04722-4

T. Fuhr, G. Leurent, and V. Suder, Collision Attacks Against CAESAR Candidates, Lecture Notes in Computer Science, vol.9453, issue.2, pp.510-532, 2015.
DOI : 10.1007/978-3-662-48800-3_21

URL : https://hal.archives-ouvertes.fr/hal-01102031

L. K. Grover, A fast quantum mechanical algorithm for database search, Proceedings of the twenty-eighth annual ACM symposium on Theory of computing , STOC '96, pp.212-219, 1996.
DOI : 10.1145/237814.237866

URL : http://infidel.c.u-tokyo.ac.jp/~ysato/seminar/grover.ps.gz

V. T. Hoang, T. Krovetz, and P. Rogaway, Robust Authenticated-Encryption AEZ and the Problem That It Solves, pp.15-44
DOI : 10.1007/978-3-662-46800-5_2

URL : http://eprint.iacr.org/2014/793.pdf

M. Kaplan, G. Leurent, A. Leverrier, and M. Naya-plasencia, Breaking Symmetric Cryptosystems Using??Quantum??Period Finding, Advances in Cryptology -CRYPTO 2016 -36th Annual International Cryptology Conference Proceedings, Part II, pp.207-237, 2016.
DOI : 10.1103/PhysRevA.78.042333

URL : https://hal.archives-ouvertes.fr/hal-01404196

G. Kuperberg, A Subexponential-Time Quantum Algorithm for the Dihedral Hidden Subgroup Problem, SIAM Journal on Computing, vol.35, issue.1, pp.170-188, 2005.
DOI : 10.1137/S0097539703436345

H. Kuwakado and M. Morii, Security on the quantum-type Even-Mansour cipher, Information Theory and its Applications (ISITA), 2012 International Symposium on, pp.312-316, 2012.

D. A. Mcgrew, Galois Counter Mode, Encyclopedia of Cryptography and Security, pp.506-508, 2011.

P. Rogaway, M. Bellare, J. Black, and T. Krovetz, OCB: a block-cipher mode of operation for efficient authenticated encryption, Proceedings of the 8th ACM Conference on Computer and Communications Security, pp.196-205, 2001.

P. W. Shor, Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer, SIAM Journal on Computing, vol.26, issue.5, pp.1484-1509, 1997.
DOI : 10.1137/S0097539795293172

D. R. Simon, On the Power of Quantum Computation, SIAM Journal on Computing, vol.26, issue.5, pp.1474-1483, 1997.
DOI : 10.1137/S0097539796298637

V. Soukharev, D. Jao, and S. Seshadri, Post-Quantum Security Models for Authenticated Encryption, pp.64-78
DOI : 10.1007/978-3-319-29360-8_5

T. Takagi, Post-Quantum Cryptography -7th International Workshop, Proceedings, Lecture Notes in Computer Science, 2016.

L. Yang and H. W. Li, Investigating the linear structure of Boolean functions based on Simon's period-finding quantum algorithm, 1306.