Skip to main content

Showing 1–4 of 4 results for author: Naya-Plasencia, M

Searching in archive cs. Search in all archives.
.
  1. Quantum Attacks without Superposition Queries: the Offline Simon's Algorithm

    Authors: Xavier Bonnetain, Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki, André Schrottenloher

    Abstract: In symmetric cryptanalysis, the model of superposition queries has led to surprising results, with many constructions being broken in polynomial time thanks to Simon's period-finding algorithm. But the practical implications of these attacks remain blurry. In contrast, the results obtained so far for a quantum adversary making classical queries only are less impressive. In this paper, we introduce… ▽ More

    Submitted 27 February, 2020; originally announced February 2020.

    Comments: ASIACRYPT 2019

  2. Breaking Symmetric Cryptosystems using Quantum Period Finding

    Authors: Marc Kaplan, Gaëtan Leurent, Anthony Leverrier, María Naya-Plasencia

    Abstract: Due to Shor's algorithm, quantum computers are a severe threat for public key cryptography. This motivated the cryptographic community to search for quantum-safe solutions. On the other hand, the impact of quantum computing on secret key cryptography is much less understood. In this paper, we consider attacks where an adversary can query an oracle implementing a cryptographic primitive in a quantu… ▽ More

    Submitted 8 June, 2016; v1 submitted 18 February, 2016; originally announced February 2016.

    Comments: 31 pages, 14 figures

    Journal ref: Proceedings of CRYPTO 2016

  3. Quantum Differential and Linear Cryptanalysis

    Authors: Marc Kaplan, Gaëtan Leurent, Anthony Leverrier, María Naya-Plasencia

    Abstract: Quantum computers, that may become available one day, would impact many scientific fields, most notably cryptography since many asymmetric primitives are insecure against an adversary with quantum capabilities. Cryptographers are already anticipating this threat by proposing and studying a number of potentially quantum-safe alternatives for those primitives. On the other hand, symmetric primitives… ▽ More

    Submitted 7 March, 2017; v1 submitted 20 October, 2015; originally announced October 2015.

    Comments: 25 pages

    Journal ref: Transactions on Symmetric Cryptology 2017, Issue 1, 71-94

  4. arXiv:0904.4412  [pdf, ps, other

    cs.CR

    Computing the biases of parity-check relations

    Authors: Anne Canteaut, Maria Naya-Plasencia

    Abstract: A divide-and-conquer cryptanalysis can often be mounted against some keystream generators composed of several (nonlinear) independent devices combined by a Boolean function. In particular, any parity-check relation derived from the periods of some constituent sequences usually leads to a distinguishing attack whose complexity is determined by the bias of the relation. However, estimating this bi… ▽ More

    Submitted 28 April, 2009; originally announced April 2009.

    Journal ref: 2009 IEEE International Symposium on Information Theory (ISIT2009), Seoul : Corée, République de (2009)