Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
In this work, all the versions of SPECK are evaluated against quantum adversary in terms of Grovers algorithm. We extensively study the resource requirements for quantum key search under the model of known plaintext attack and show that our estimation provides better result than the existing efforts.
Dec 8, 2020 · In this work, all the versions of SPECK are evaluated against quantum adversary in terms of Grovers algorithm. We extensively study the ...
Abstract. In this present initiative, all the versions of SPECK are eval- uated against quantum adversary in terms of Grovers algorithm. We ex-.
In this work, all the versions of SPECK are evaluated against quantum adversary in terms of Grovers algorithm. We extensively study the resource ...
Dec 9, 2020 · PDF | In this work, all the versions of SPECK are evaluated against quantum adversary in terms of Grovers algorithm.
In this work, all the versions of SPECK are evaluated against quantum adversary in terms of Grovers algorithm. We extensively study the resource ...
Evaluation of Quantum Cryptanalysis on SPECK. https://doi.org/10.1007/978-3-030-65277-7_18 ·. Journal: Progress in Cryptology – INDOCRYPT 2020 Lecture Notes ...
We revisit these two works, and present improved benchmarks SPECK (all 10 variants). Our implementations incur lower full depth compared to the previous works.
Evaluation of Quantum Cryptanalysis on SPECK by Ravi Anand, Arpita Maitra and Sourav Mukhopadhyay. How can I help you?