Computer Science ›› 2024, Vol. 51 ›› Issue (6A): 230900051-6.doi: 10.11896/jsjkx.230900051
• Information Security • Previous Articles Next Articles
LYU Yi1, LUO Qingbin1,2, LI Qiang1, ZHENG Yuanmeng3
CLC Number:
[1]BENNETT C H.Logical Reversibility of Computation[J].IBM Journal of Research and Development,1973,17(6):525-532. [2]SARAVANAN P,KALPANA P.Novel Reversible Design ofAdvanced Encryption Standard Cryptographic Algorithm for Wireless Sensor Networks[J].Wireless Personal Communications,2018,100(4):1427-1458. [3]FIPS 197.Advanced Encryption Standard(AES)[S].Gaithersburg,NIST,2001. [4]LIN D,XIANG Z,XU R,et al.Optimized Quantum Implementation of AES[J].arXiv:2109.12354,2021. [5]LI Z,GAO F,QIN S,et al.New record in the number of qubits for a quantum implementation of AES[J].Frontiers in Physics,2023,11:1171753. [6]JAQUES S.Implementing Grover Oracles for Quantum KeySearch on AES and LowMC[J].arXiv:1910.01700,2019. [7]LI Z,CAI B,SUN H,et al.Novel quantum circuit implementation of Advanced Encryption Standard with low costs[J].Science China Physics,Mechanics & Astronomy,2022,65(9),290311. [8]HUANG Z,SUN S.Synthesizing Quantum Circuits of AES with Lower T-depth and Less Qubits[M]//Advances in Cryptology-ASIACRYPT.Cham:Springer,2022:614-644. [9]FOWLER A G.Time-optimal quantum computation[J].arXiv:1210.4626,2013. [10]AOKI K,ICHIKAWA T,KANDA M,et al.Camel lia:a 128-bit block cipher suitable for multiple platforms-design and analysis[C]//Proceedings of the 7th Annual International Workshop.Waterloo:Springer,2000:39-56. [11]ZOU J,WEI Z,SUN S,et al.Some efficient quantum circuit implementations of Camellia[J].Quantum Information Processing,2022,21(4):131. [12]LI Z Q,GAO F,QIN S J,et al.Quantum circuit for implementing Camellia S-box with low costs[J].Science China Physics,Mechanics & Astronomy,2023,53(4):21-29. [13]XIANG Z,ZENG X,LIN D,et al.Optimizing Imple mentations of Linear Layers[J].IACR Trans.Symm.Cryptol.,2020(2):120-145. [14]ROMAN S.Field Extensions[M]//Graduate Texts in Mathematics:Field Theory.New York:Springer,1995:39-59. [15]LUO Q B,LI X Y,YAGN G W,et al.Quantum Cir cuit Implementation of S-box for SM4 Cryptographic Algorithm Based on Composite Field Arithmetic[J].Journal of University of Electronic Science and Technology of China,2022,50(6):820-826. [16]LI Z Q,CAI B B,SUN H W,et al.Novel quantum circuit implementation of Advanced Encryption Standard with low costs[J].Chinese Science:Physics,Mechanics and Astronomy,2022(9):65. [17]ALMAZROOIE M,ABDULLAH R,SAMSUDIN A,et al.Quantum Grover Attack on the Simplified-AES[C]//Proceedings of the 2018 7th International Conference on Software and Computer Applications.Kuantan Malaysia:ACM,2018:204-211. [18]SARAVANAN P,KALPANA P.Novel Reversible Design ofAdvanced Encryption Standard Cryptographic Algorithm for Wireless Sensor Networks[J].Wireless Personal Communications,2018,100(4):1427-1458. [19]WANG Z G,WEI S J,LONG G L.A quantum circuit design of AES requiring fewer quantumqubits and gate operations[J].Front Phys,2022,17:41501 [20]BOYAR J,PERALTA R.A New Combinational Logic Minimization Technique with Applications to Cryptology[C]//Experimental Algorithms[M].Berlin:Springer,2010:178-189. [21]DASU V A,BAKSI A,SARKAR S,et al.LIGHTER-R:Optimized Reversible Circuit Implementation For SBoxes[C]//2019 32nd IEEE International System-on-Chip Conference(SOCC).Singapore:IEEE,2019:260-265. [22]CHUN M,BAKSI A,CHATTOPADHYAY A.DORCIS:Depth Optimized Quantum Implementation of Substitution Boxes[EB/OL].(2023-02-25).https://eprint.iacr.org/2023/286. |
[1] | LIU Xiaonan, LIU Zhengyu, XIE Haoshan, ZHAO Chenyan. Solving Graph Coloring Problem Based on Grover Algorithm [J]. Computer Science, 2023, 50(6): 351-357. |
[2] | ZHAO Geng, GAO Shirui, MA Yingjie, DONG Youheng. Design of Dynamic S-box Based on Anti-degradation Chaotic System and Elementary Cellular Automata [J]. Computer Science, 2023, 50(11): 333-339. |
[3] | LIU Jian-mei, WANG Hong, MA Zhi. Optimization for Shor's Integer Factorization Algorithm Circuit [J]. Computer Science, 2022, 49(6A): 649-653. |
[4] | LU Yao, CHEN Kai-yan, WANG Yin-long and SHANG Qian-yi. L3 Cache Attack Against Last Round of Encryption AES Table Lookup Method [J]. Computer Science, 2020, 47(6A): 375-380. |
[5] | HAN Yu, ZHANG Wen-zheng, DONG Xin-feng. Design and Analysis of Trapdoor S-Box Based on Linear Partition [J]. Computer Science, 2020, 47(11A): 368-372. |
[6] | LIANG Yan-hui, LI Guo-dong, WANG Ai-yan. Frequency Domain Adaptive Image Encryption Algorithm Based on Fractional Order Chen Hyperchaos [J]. Computer Science, 2019, 46(11A): 488-492. |
[7] | LIANG Yan-hui, LI Guo-dong. Image Encryption Algorithm of Chaotic Cellular Automata Based on Fractional Hyperchaos [J]. Computer Science, 2019, 46(11A): 502-506. |
[8] | ZHANG Li, WEI Hong-ru. Improved Higher-order Meet-in-the-Middle Attack on Camellia-256 [J]. Computer Science, 2019, 46(11): 119-122. |
[9] | DING Jie, SHI Hui, GONG Jing and DENG Yuan-qing. Design and Characteristic Study on Fast Stream Cipher Algorithm Based on Camellia [J]. Computer Science, 2017, 44(8): 146-150. |
[10] | CAO Xiao-mei, CHEN Hai-shan and WANG Shao-hui. Method to Construct Secure S-boxes Based on Multimap [J]. Computer Science, 2017, 44(7): 107-110. |
[11] | FAN Fu-you, YANG Guo-wu, ZHANG Yan and YANG Gang. Three-valued Quantum Elementary and Implementation of Quantum Fourier Transform Circuit [J]. Computer Science, 2015, 42(7): 57-61. |
[12] | QIU Feng-pin and WEI Hong-ru. Impossible Differential Cryptanalysis of CLEFIA-128 [J]. Computer Science, 2015, 42(11): 208-211. |
[13] | YIN Guang-li and WEI Hong-ru. Impossible Differential Cryptanalysis of CLEFIA [J]. Computer Science, 2014, 41(Z6): 352-356. |
[14] | FAN Fu-you,YANG Guo-wu,LI Xiao-yu and LUO Qing-bin. Realization of Toffoli Gate Only Using CNOT Gate in Hybrid Multi-value Reversible Logic [J]. Computer Science, 2014, 41(8): 115-117. |
[15] | LUO Qing-bin,YANG Guo-wu,SHAO Yuan-hua and FAN Fu-you. Judgment of NP-NP Equivalence for 3-bit Reversible Logic Functions via Fixed Polarity Reed-muller Forms [J]. Computer Science, 2013, 40(10): 218-220. |
|