Login / Signup
Quantum attacks against BBB secure PRFs or MACs built from public random permutations.
Jiehui Nan
Honggang Hu
Ping Zhang
Yiyuan Luo
Published in:
Quantum Inf. Process. (2023)
Keyphrases
</>
chosen plaintext
cryptographic protocols
secure routing
stream cipher
security protocols
security mechanisms
security flaws
countermeasures
pseudorandom
security measures
quantum computing
security properties
quantum mechanics
unauthorized access
information leakage
quantum computation