Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts, p.1187, 1610. ,
DOI : 10.1007/978-3-642-32009-5_44
Post-Quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of Operation, pp.44-63 ,
DOI : 10.1007/978-3-319-29360-8_4
SPHINCS: Practical Stateless Hash-Based Signatures, pp.368-397 ,
DOI : 10.1007/978-3-662-46800-5_15
URL : http://eprint.iacr.org/2014/795.pdf
Cryptanalysis of NORX v2.0, IACR Trans. Symmetric Cryptol, vol.2017, issue.1, pp.156-174, 2017. ,
Is AEZ v4.1 Sufficiently Resilient Against Key- Recovery Attacks?, IACR Trans. Symmetric Cryptol, vol.1, issue.1, pp.114-133, 2016. ,
The Design of Rijndael: AES -The Advanced Encryption Standard, Information Security and Cryptography, 2002. ,
DOI : 10.1007/978-3-662-04722-4
Collision Attacks Against CAESAR Candidates, Lecture Notes in Computer Science, vol.9453, issue.2, pp.510-532, 2015. ,
DOI : 10.1007/978-3-662-48800-3_21
URL : https://hal.archives-ouvertes.fr/hal-01102031
A fast quantum mechanical algorithm for database search, Proceedings of the twenty-eighth annual ACM symposium on Theory of computing , STOC '96, pp.212-219, 1996. ,
DOI : 10.1145/237814.237866
URL : http://infidel.c.u-tokyo.ac.jp/~ysato/seminar/grover.ps.gz
Robust Authenticated-Encryption AEZ and the Problem That It Solves, pp.15-44 ,
DOI : 10.1007/978-3-662-46800-5_2
URL : http://eprint.iacr.org/2014/793.pdf
Breaking Symmetric Cryptosystems Using??Quantum??Period Finding, Advances in Cryptology -CRYPTO 2016 -36th Annual International Cryptology Conference Proceedings, Part II, pp.207-237, 2016. ,
DOI : 10.1103/PhysRevA.78.042333
URL : https://hal.archives-ouvertes.fr/hal-01404196
A Subexponential-Time Quantum Algorithm for the Dihedral Hidden Subgroup Problem, SIAM Journal on Computing, vol.35, issue.1, pp.170-188, 2005. ,
DOI : 10.1137/S0097539703436345
Security on the quantum-type Even-Mansour cipher, Information Theory and its Applications (ISITA), 2012 International Symposium on, pp.312-316, 2012. ,
Galois Counter Mode, Encyclopedia of Cryptography and Security, pp.506-508, 2011. ,
OCB: a block-cipher mode of operation for efficient authenticated encryption, Proceedings of the 8th ACM Conference on Computer and Communications Security, pp.196-205, 2001. ,
Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer, SIAM Journal on Computing, vol.26, issue.5, pp.1484-1509, 1997. ,
DOI : 10.1137/S0097539795293172
On the Power of Quantum Computation, SIAM Journal on Computing, vol.26, issue.5, pp.1474-1483, 1997. ,
DOI : 10.1137/S0097539796298637
Post-Quantum Security Models for Authenticated Encryption, pp.64-78 ,
DOI : 10.1007/978-3-319-29360-8_5
Post-Quantum Cryptography -7th International Workshop, Proceedings, Lecture Notes in Computer Science, 2016. ,
Investigating the linear structure of Boolean functions based on Simon's period-finding quantum algorithm, 1306. ,