Quantum Boomerang Attacks and Some Applications.
Paul FrixonsMaría Naya-PlasenciaAndré SchrottenloherPublished in: IACR Cryptol. ePrint Arch. (2022)
Keyphrases
- quantum computation
- countermeasures
- quantum inspired
- malicious attacks
- chosen plaintext
- malicious users
- security protocols
- cyber attacks
- java card
- logic circuits
- computer security
- terrorist attacks
- attack detection
- quantum computing
- image watermarking
- security threats
- quantum mechanics
- security mechanisms
- watermarking algorithm
- probability ranking principle
- website