Login / Signup
Beyond quadratic speedups in quantum attacks on symmetric schemes.
Xavier Bonnetain
André Schrottenloher
Ferdinand Sibleyras
Published in:
CoRR (2021)
Keyphrases
</>
orders of magnitude
parallel processing
countermeasures
computer security
cryptographic protocols
quantum computing
quantum computation
symmetric matrix
watermarking algorithm
security protocols
ddos attacks
traffic analysis
logic circuits
malicious users