Login / Signup
Attack Beyond-Birthday-Bound MACs in Quantum Setting.
Tingting Guo
Peng Wang
Lei Hu
Dingfeng Ye
Published in:
IACR Cryptol. ePrint Arch. (2020)
Keyphrases
</>
upper bound
worst case
lower bound
data mining
quantum inspired
optimal solution
error bounds
estimation error
attack detection
quantum computing
key exchange protocol