QUANTUM PERIOD FINDING PROBLEM AS A DRIVER OF QUANTUM CRYPTANALYSIS
Анотація
Повний текст:
PDFПосилання
Shor, P. W. (1997). Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. SIAM Journal on Computing, 26(5), 1484–1509. https://epubs.siam.org/doi/10.1137/S0097539795293172
Nielsen, M. A., & Chuang, I. L. (2002). Quantum Computation and Quantum Information. Cambridge University Press. https://shorturl.at/09toE
Watrous, J. (2009). Quantum Computational Complexity. In: Meyers, R. (eds) Encyclopedia of Complexity and Systems Science. Springer, New York, NY. https://doi.org/10.1007/978-0-387-30440-3_428
Pollard, J. M. (1975). A Monte Carlo method for factorization. BIT Numerical Mathematics, 15(3), 331-334. https://link.springer.com/article/10.1007/BF01933667
Simon, D. R. (1994). On the Power of Quantum Computation. Proceedings of the 35th Annual Symposium on Foundations of Computer Science. https://ieeexplore.ieee.org/document/365701
Roetteler, M., & Beth, T. (1998). Polynomial-time solution to the hidden subgroup problem for a class of non-abelian groups. arXiv preprint quant-ph/9812070. https://arxiv.org/abs/quant-ph/9812070
Kuperberg, G. (2005). A subexponential-time quantum algorithm for the dihedral hidden subgroup problem. SIAM Journal on Computing, 35(1), 170–188. https://epubs.siam.org/doi/10.1137/S0097539703436345
Hallgren, S., Russell, A., & Ta-Shma, A. (2003). The hidden subgroup problem and quantum computation using group representations. SIAM Journal on Computing, 32(4), 916–934. https://epubs.siam.org/doi/abs/10.1137/S0097539701391800
Bernstein, D. J., & Lange, T. (2017). Post-quantum cryptography. Nature, 549(7671), 188-194. https://www.nature.com/articles/nature23461
Regev, O. (2005). On lattices, learning with errors, random linear codes, and cryptography. Journal of the ACM, 56(6), 1-40. https://dl.acm.org/doi/10.1145/1568318.1568324
Peikert, C. (2016). A decade of lattice cryptography. Foundations and Trends in Theoretical Computer Science, 10(4), 283–424. https://shorturl.at/0CFgn
Y. Kotukh, G. Khalimov. Hard Problems for Non-abelian Group Cryptography. Fifth International Scientific and Technical Conference" Computer and Information systems and technologies". https://doi.org/10.30837/csitic52021232176
Y. Kotukh, G. Khalimov. Towards practical cryptoanalysis of systems based on word problems and logarithmic signatures. INFORMATION SECURITY: PROBLEMS AND PROSPECTS". https://shorturl.at/IaByX
Y. Kotukh, G. Khalimov. Advantages of logarithmic signatures in the implementation of crypto primitives. Challenges and Issues of Modern Science. https://cims.fti.dp.ua/j/article/download/119/158
Y. Kotukh. Quantum cryptoanalysis of prospective asymmetric cryptosystems. Proceedings of conference “Cybersecurity in energy sector”. https://shorturl.at/1pbcK
Посилання
- Поки немає зовнішніх посилань.