Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
64
views
35
references
Top references
cited by
16
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,448
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology – CRYPTO 2016
Breaking Symmetric Cryptosystems Using Quantum Period Finding
other
Author(s):
Marc Kaplan
,
Gaëtan Leurent
,
Anthony Leverrier
,
María Naya-Plasencia
Publication date
(Online):
July 21 2016
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Genome Engineering using CRISPR
Most cited references
35
Record
: found
Abstract
: not found
Article
: not found
Hacking commercial quantum cryptography systems by tailored bright illumination
Lars Lydersen
,
Carlos Wiechers
,
Christoffer Wittmann
…
(2010)
0
comments
Cited
211
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
On the Power of Quantum Computation
Daniel R. Simon
(1997)
0
comments
Cited
169
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems
Yi. Zhao
,
Chi-Hang Fung
,
Bing Qi
…
(2008)
0
comments
Cited
115
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2016
Publication date (Online):
July 21 2016
Pages
: 207-237
DOI:
10.1007/978-3-662-53008-5_8
SO-VID:
b3203100-174f-4864-ba59-830c07eb3abc
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 157
Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks
pp. 123
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
pp. 207
Breaking Symmetric Cryptosystems Using Quantum Period Finding
pp. 629
Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
Similar content
3,448
Real-time implementation of a chaos based cryptosystem on low-cost hardware
Authors:
L. Merah
,
Lahcene Merah
,
Asma Adnane
…
Deoxyribonucleic acid (DNA) for a shared secret key cryptosystem with Diffie hellman key sharing technique
Authors:
Asish Aieh
,
Alo Sen
,
Satya Ranjan Dash
…
Rivest-Shamir-Adleman public key cryptosystems do not always conceal messages
Authors:
G.R. Blakley
,
I. Borosh
See all similar
Cited by
16
Quantum technology for military applications
Authors:
Michal Krelina
Hidden Shift Quantum Cryptanalysis and Implications
Authors:
Xavier Bonnetain
,
María Naya-Plasencia
Quantum Simulation Logic, Oracles, and the Quantum Advantage
Authors:
Niklas Johansson
,
Jan-Åke Larsson
See all cited by