Page 416 - 《软件学报》2025年第7期
P. 416
许垠松 等: 分组密码结构的低数据量子密钥恢复攻击 3337
[6] Cui JY, Guo JS, Ding SZ. Applications of Simon’s algorithm in quantum attacks on Feistel variants. Quantum Information Processing,
2021, 20(3): 117. [doi: 10.1007/s11128-021-03027-x]
[7] Kuwakado H, Morii M. Quantum distinguisher between the 3-round Feistel cipher and the random permutation. In: Proc. of the 2010
IEEE Int’l Symp. on Information Theory. Austin: IEEE, 2010. 2682–2685. [doi: 10.1109/ISIT.2010.5513654]
[8] Simon DR. On the power of quantum computation. SIAM Journal on Computing, 1997, 26(5): 1474–1483. [doi: 10.1137/
S0097539796298637]
[9] Kuwakado H, Morii M. Security on the quantum-type Even-Mansour cipher. In: Proc. of the 2012 Int’l Symp. on Information Theory and
Its Applications. Honolulu: IEEE, 2012. 312–316.
[10] Kaplan M, Leurent G, Leverrier A, Naya-Plasencia M. Breaking symmetric cryptosystems using quantum period finding. In: Proc. of the
36th Annual Int’l Cryptology Conf. Santa Barbara: Springer, 2016. 207–237. [doi: 10.1007/978-3-662-53008-5_8]
[11] Leander G, May A. Grover meets Simon-quantumly attacking the FX-construction. In: Proc. of the 23rd Int’l Conf. on the Theory and
Applications of Cryptology and Information Security. Hong Kong: Springer, 2017. 161–178. [doi: 10.1007/978-3-319-70697-9_6]
[12] Grover LK. A fast quantum mechanical algorithm for database search. In: Proc. of the 28th Annual ACM Symp. on Theory of
Computing. Philadelphia: ACM, 1996. 212–219. [doi: 10.1145/237814.237866]
[13] Dong XY, Wang XY. Quantum key-recovery attack on Feistel structures. Science China Information Sciences, 2018, 61(10): 102501.
[doi: 10.1007/s11432-017-9468-y]
[14] Dong XY, LI Z, Wang XY. Quantum cryptanalysis on some generalized Feistel schemes. Science China Information Sciences, 2019,
62(2): 22501. [doi: 10.1007/s11432-017-9436-7]
[15] Zhang ZY, Wu WL, Sui H, Wang BL. Quantum attacks on Type-3 generalized Feistel scheme and unbalanced Feistel scheme with
expanding functions. Chinese Journal of Electronics, 2023, 32(2): 209–216. [doi: 10.23919/cje.2021.00.294]
[16] Ito G, Hosoyamada A, Matsumoto R, Sasaki Y, Iwata T. Quantum chosen-ciphertext attacks against Feistel ciphers. In: Proc. of the 2019
Cryptographers’ Track at the RSA Conf. San Francisco: Springer, 2019. 391–411. [doi: 10.1007/978-3-030-12612-4_20]
[17] Hosoyamada A, Sasaki Y. Quantum Demiric-Selcuk meet-in-the-middle attacks: Applications to 6-round generic Feistel constructions.
In: Proc. of the 11th Int’l Conf. on Security and Cryptography for Networks. Amalfi: Springer, 2018. 386–403. [doi: 10.1007/978-3-319-
98113-0_21]
[18] Guo J, Jean J, Nikoli Nikolić I, Sasaki Y. Extended meet-in-the-middle attacks on some Feistel constructions. Designs, Codes and
Cryptography, 2016, 80(3): 587–618. [doi: 10.1007/s10623-015-0120-4]
[19] Daiza T, Yoneyama K. Quantum key recovery attacks on 3-round Feistel-2 structure without quantum encryption oracles. In: Proc. of the
17th Int’l Workshop on Security. Tokyo: Springer, 2022. 128–144. [doi: 10.1007/978-3-031-15255-9_7]
[20] Mao SP, Guo TT, Wang P, Hu L. Quantum attacks on Lai-Massey structure. In: Proc. of the 13th Int’l Workshop. Springer, 2022.
205–229. [doi: 10.1007/978-3-031-17234-2_11]
[21] Zou J, Zou HK, Dong XY, Wu WL, Luo YY. New key recovery attack based on periodic property. Ruan Jian Xue Bao/Journal of
Software, 2023, 34(9): 4239–4255 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/6636.htm [doi: 10.13328/j.cnki.
jos.006636]
[22] Vaudenay S. On the Lai-Massey scheme. In: Proc. of the 1999 Int’l Conf. on the Theory and Application of Cryptology and Information
Security. Singapore: Springer, 1999. 8–19. [doi: 10.1007/978-3-540-48000-6_2]
[23] Luo YY, Lai XJ, Hu J. The pseudorandomness of many-round Lai-Massey scheme. Journal of Information Science and Engineering,
2015, 31(1): 1085–1096]
[24] Luo YY, Yan HL, Wang L, Hu HG, Lai XJ. Study on block cipher structures against Simon’s quantum algorithm. Journal of Cryptologic
Research, 2019, 6(5): 561–573 (in Chinese with English abstract). [doi: 10.13868/j.cnki.jcr.000322]
[25] Gouget A, Patarin J, Toulemonde A. (Quantum) Cryptanalysis of Misty schemes. In: Proc. of the 23rd Int’l Conf. on Information Security
and Cryptology. Seoul: Springer, 2020. 43–57. [doi: 10.1007/978-3-030-68890-5_3]
[26] Adams C, Gilchrist J. The CAST-256 encryption algorithm. RFC 2612, 1999. [doi: 10.17487/RFC2612]
[27] Deng YH, Jin CH, Li RJ. Meet in the middle attack on Type-1 Feistel construction. In: Proc. of the 13th Int’l Conf. on Information
Security and Cryptology. Xi’an: Springer, 2018. 427–444. [doi: 10.1007/978-3-319-75160-3_25]
[28] Ni BY, Ito G, Dong XY, Iwata T. Quantum attacks against Type-1 generalized Feistel ciphers and applications to CAST-256. In: Proc. of
the 20th Int’l Conf. on Cryptology in India. Hyderabad: Springer, 2019. 433–455. [doi: 10.1007/978-3-030-35423-7_22]
[29] Diffie W, Ledin G. SMS4 encryption algorithm for wireless networks. IACR Cryptology ePrint Archive, 2008, 2008: 329.
[30] You QD, Qian X, Zhou X, Yuan Y, Wu ZY. Research on quantum cryptanalysis on SMS4-like structure and NBC algorithm. Journal of
Cryptologic Research, 2020, 7(6): 864–874. (in Chinese with English abstract). [doi: 10.13868/j.cnki.jcr.000412]

