Login / Signup
Quantum All-Subkeys-Recovery Attacks on 6-round Feistel-2* Structure Based on Multi-Equations Quantum Claw Finding.
Wenjie Liu
Mengting Wang
Zixian Li
Published in:
CoRR (2023)
Keyphrases
</>
quantum computing
quantum computation
quantum mechanics
quantum inspired
database
countermeasures
data sets
structural information
graph structure
security risks
denial of service attacks
probability ranking principle
quantum evolutionary algorithm