Computer Science ›› 2025, Vol. 52 ›› Issue (11A): 250100075-7.doi: 10.11896/jsjkx.250100075
• Information Security • Previous Articles Next Articles
DING Lang1, LUO Qingbin1, LYU Yi1, ZHENG Yuanmeng2, LIAO Haoyu2
CLC Number:
| [1]ELGAMAL T.A public key cryptosystem and a signaturescheme based on discrete logarithms[J].IEEE transactions on information theory,1985,31(4):469-472. [2]SHOR P W.Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer[J].SIAM review,1999,41(2):303-332. [3]SIMON D R.On the power of quantum computation[J].SIAM journal on computing,1997,26(5):1474-1483. [4]KAPLAN M,LEURENT G,LEVERRIER A,et al.Breakingsymmetric cryptosystems using quantum period finding[C]//Advances in Cryptology-CRYPTO 2016:36th Annual International Cryptology Conference,Santa Barbara,CA,USA,August 14-18,2016,Proceedings,Part II 36.Springer Berlin Heidelberg,2016:207-237. [5]GROVER L K.A fast quantum mechanical algorithm for database search[C]//Proceedings of the twenty-eighth annual ACM symposium on Theory of computing.1996:212-219. [6]CHUNG D,LEE S,CHOI D,et al.Alternative tower field construction for quantum implementation of the AES S-box[J].IEEE Transactions on Computers,2021,71(10):2553-2564. [7]LIU Q,PRENEEL B,ZHAO Z,et al.Improved quantum circuits for AES:Reducing the depth and the number of qubits[C]//International Conference on the Theory and Application of Cryptology and Information Security.Singapore:Springer Nature Singapore,2023:67-98. [8]SHI H,FENG X.Quantum circuits of AES with a low-depthlinear layer and a new structure[C]//International Conference on the Theory and Application of Cryptology and Information Security.Singapore:Springer Nature Singapore,2024:358-395. [9]O’GORMAN J,CAMPBELL E T.Quantum computation with realistic magic-state factories[J].Physical Review A,2017,95(3):032338. [10]WANG Z G,WEI S J,LONG G L.A quantum circuit design of AES requiring fewer quantum qubits and gate operations[J].Frontiers of Physics,2022,17(4):41501. [11]SIMMONS S.Algebraic Cryptanalysis of Simplified AES*[J].Cryptologia,2009,33(4):305-314. [12]SAEED R,BHERY A.Cryptanalysis of Simplified-AES Using Intelligent Agent[C]//Hybrid Artificial Intelligent Systems:10th International Conference,HAIS 2015,Bilbao,Spain,June 22-24,2015,Proceedings 10.Springer International Publishing,2015:173-187. [13]CAMPBELL S,GRINCHENKO M,SMITH W.Linear cryptanalysis of simplified AES under change of S-Box[J].Cryptologia,2013,37(2):120-138. [14]MUSA M A,SCHAEFER E F,WEDIG S.A simplified AES algorithm and its linear and differential cryptanalyses[J].Cryptologia,2003,27(2):148-177. [15]ALMAZROOIE M,ABDULLAH R,SAMSUDIN A,et al.Quantum grover attack on the simplified aes[C]//Proceedings of the 2018 7th International Conference on Software and Computer Applica tions.2018:204-211. [16]JANG K B,SONG G J,KIM H J,et al.Grover on simplified aes[C]//2021 IEEE International Confer ence on Consumer Electronics-Asia(ICCE-Asia).IEEE,2021:1-4. [17]JEAN J,PEYRIN T,SIM S M,et al.Optimizing implementa-tions of lightweight building blocks[J].Cryptology ePrint Archive,2017,4:130-168. [18]CHUN M,BAKSI A,CHATTOPADHYAY A.Dorcis:depthoptimized quantum implementation of substitution boxes[J].Cryptology ePrint Archive,2023,2(8):6-16. [19]SHENDE V V,BULLOCK S S,MARKOV I L.Synthesis ofquantum logic circuits[C]//Proceedings of the 2005 Asia and South Pacific Design Automation Conference.2005:272-275. [20]LUO Q,LI Q,LI X,et al.Quantum circuit implementations of SM4 block cipher optimizing the number of qubits[J].Quantum Information Processing,2024,23(5):177. [21]NIELSEN M A,CHUANG I L.Quantum computation andquantum information[M].Cambridge University Press,2010. |
| [1] | ZHANG Yaolin, LIU Xiaonan, DU Shuaiqi, LIAN Demeng. Hybrid Quantum-classical Compressed Generative Adversarial Networks Based on Matrix Product Operators [J]. Computer Science, 2025, 52(6): 74-81. |
| [2] | LI Hui, WANG Jiepeng, JI Yingsong, CHEN Yutong. 2QAN Quantum Circuit Scheduling Optimization Based on Quantum Firefly Algorithm [J]. Computer Science, 2025, 52(11A): 250200097-10. |
| [3] | LYU Yi, LUO Qingbin, LI Qiang, ZHENG Yuanmeng. Quantum Circuit Optimization of Camellia Cryptographic Algorithm S-box [J]. Computer Science, 2024, 51(6A): 230900051-6. |
| [4] | LI Zheng, LI Manman, CHEN Shaozhen. A Meet-in-the-middle Attack Method of Deoxys-BC [J]. Computer Science, 2024, 51(2): 378-386. |
| [5] | CHEN Chao, YAN Wenjie, XUE Guixiang. Parameterized Quantum Circuits Based Quantum Neural Networks for Data Classification [J]. Computer Science, 2024, 51(11A): 231200112-7. |
| [6] | ZHONG Yue, GU Jieming, CAO Honglin. Survey of Lightweight Block Cipher [J]. Computer Science, 2023, 50(9): 3-15. |
| [7] | LIU Xiaonan, LIU Zhengyu, XIE Haoshan, ZHAO Chenyan. Solving Graph Coloring Problem Based on Grover Algorithm [J]. Computer Science, 2023, 50(6): 351-357. |
| [8] | LIU Jian-mei, WANG Hong, MA Zhi. Optimization for Shor's Integer Factorization Algorithm Circuit [J]. Computer Science, 2022, 49(6A): 649-653. |
| [9] | WANG Jian, CHEN Hua, KUANG Xiao-yun, YANG Yi-wei, HUANG Kai-tian. Study on Threat of Persistent Fault Attack [J]. Computer Science, 2021, 48(11A): 523-527. |
| [10] | SHEN Xuan, WANG Xin-mei, HE Jun, SUN Zhi-yuan. Revised Impossible Differential Cryptanalysis of PFP Block Cipher [J]. Computer Science, 2020, 47(7): 263-267. |
| [11] | ZHU Ren-jie. Study on SM4 Differential Fault Attack Under Extended Fault Injection Range [J]. Computer Science, 2019, 46(11A): 493-495. |
| [12] | LI Lang and LIU Bo-tao. Surge:A New Low-resource and Efficient Lightweight Block Cipher [J]. Computer Science, 2018, 45(2): 236-240. |
| [13] | LI Lang, ZOU Yi, LI Zhu-hua and LIU Bo-tao. Differential Fault Analysis on DBlock Cipher Algorithm [J]. Computer Science, 2017, 44(7): 116-119. |
| [14] | HUANG Yu-hua, DAI Xue-jun, SHI Yang-yang, LIU Ning-zhong, ZENG Qing-xi and SU Fei. Ultra-lightweight Block Cipher Algorithm (PFP) Based on Feistel Structure [J]. Computer Science, 2017, 44(3): 163-167. |
| [15] | MA Meng, ZHAO Ya-qun and LIU Qing-cong. Integral Zero-correlation Cryptanalysis on Zodiac [J]. Computer Science, 2017, 44(2): 202-205. |
|
||