Quantum Attacks on Beyond-Birthday-Bound MACs.
Hong-Wei SunBin-Bin CaiSu-Juan QinQiao-Yan WenFei GaoPublished in: IACR Cryptol. ePrint Arch. (2023)
Keyphrases
- upper bound
- lower bound
- countermeasures
- security risks
- watermarking scheme
- worst case
- quantum computing
- traffic analysis
- error bounds
- malicious users
- quantum inspired
- quantum computation
- terrorist attacks
- malicious attacks
- denial of service attacks
- logic circuits
- quantum mechanics
- ddos attacks
- detect malicious
- stepping stones
- quantum evolutionary algorithm
- chosen plaintext
- channel capacity
- data sets
- security protocols
- anomaly detection
- estimation error