Page 416 - 《软件学报》2025年第7期
P. 416

许垠松 等: 分组密码结构的低数据量子密钥恢复攻击                                                       3337


                  [6]  Cui JY, Guo JS, Ding SZ. Applications of Simon’s algorithm in quantum attacks on Feistel variants. Quantum Information Processing,
                     2021, 20(3): 117. [doi: 10.1007/s11128-021-03027-x]
                  [7]  Kuwakado H, Morii M. Quantum distinguisher between the 3-round Feistel cipher and the random permutation. In: Proc. of the 2010
                     IEEE Int’l Symp. on Information Theory. Austin: IEEE, 2010. 2682–2685. [doi: 10.1109/ISIT.2010.5513654]
                  [8]  Simon  DR.  On  the  power  of  quantum  computation.  SIAM  Journal  on  Computing,  1997,  26(5):  1474–1483.  [doi:  10.1137/
                     S0097539796298637]
                  [9]  Kuwakado H, Morii M. Security on the quantum-type Even-Mansour cipher. In: Proc. of the 2012 Int’l Symp. on Information Theory and
                     Its Applications. Honolulu: IEEE, 2012. 312–316.
                 [10]  Kaplan M, Leurent G, Leverrier A, Naya-Plasencia M. Breaking symmetric cryptosystems using quantum period finding. In: Proc. of the
                     36th Annual Int’l Cryptology Conf. Santa Barbara: Springer, 2016. 207–237. [doi: 10.1007/978-3-662-53008-5_8]
                 [11]  Leander G, May A. Grover meets Simon-quantumly attacking the FX-construction. In: Proc. of the 23rd Int’l Conf. on the Theory and
                     Applications of Cryptology and Information Security. Hong Kong: Springer, 2017. 161–178. [doi: 10.1007/978-3-319-70697-9_6]
                 [12]  Grover  LK.  A  fast  quantum  mechanical  algorithm  for  database  search.  In:  Proc.  of  the  28th  Annual  ACM  Symp.  on  Theory  of
                     Computing. Philadelphia: ACM, 1996. 212–219. [doi: 10.1145/237814.237866]
                 [13]  Dong XY, Wang XY. Quantum key-recovery attack on Feistel structures. Science China Information Sciences, 2018, 61(10): 102501.
                     [doi: 10.1007/s11432-017-9468-y]
                 [14]  Dong XY, LI Z, Wang XY. Quantum cryptanalysis on some generalized Feistel schemes. Science China Information Sciences, 2019,
                     62(2): 22501. [doi: 10.1007/s11432-017-9436-7]
                 [15]  Zhang  ZY,  Wu  WL,  Sui  H,  Wang  BL.  Quantum  attacks  on  Type-3  generalized  Feistel  scheme  and  unbalanced  Feistel  scheme  with
                     expanding functions. Chinese Journal of Electronics, 2023, 32(2): 209–216. [doi: 10.23919/cje.2021.00.294]
                 [16]   Ito G, Hosoyamada A, Matsumoto R, Sasaki Y, Iwata T. Quantum chosen-ciphertext attacks against Feistel ciphers. In: Proc. of the 2019
                      Cryptographers’ Track at the RSA Conf. San Francisco: Springer, 2019. 391–411. [doi: 10.1007/978-3-030-12612-4_20]
                 [17]  Hosoyamada A, Sasaki Y. Quantum Demiric-Selcuk meet-in-the-middle attacks: Applications to 6-round generic Feistel constructions.
                     In: Proc. of the 11th Int’l Conf. on Security and Cryptography for Networks. Amalfi: Springer, 2018. 386–403. [doi: 10.1007/978-3-319-
                     98113-0_21]
                 [18]  Guo  J,  Jean  J,  Nikoli  Nikolić  I,  Sasaki  Y.  Extended  meet-in-the-middle  attacks  on  some  Feistel  constructions.  Designs,  Codes  and
                     Cryptography, 2016, 80(3): 587–618. [doi: 10.1007/s10623-015-0120-4]
                 [19]  Daiza T, Yoneyama K. Quantum key recovery attacks on 3-round Feistel-2 structure without quantum encryption oracles. In: Proc. of the
                     17th Int’l Workshop on Security. Tokyo: Springer, 2022. 128–144. [doi: 10.1007/978-3-031-15255-9_7]
                 [20]  Mao  SP,  Guo  TT,  Wang  P,  Hu  L.  Quantum  attacks  on  Lai-Massey  structure.  In:  Proc.  of  the  13th  Int’l  Workshop.  Springer,  2022.
                     205–229. [doi: 10.1007/978-3-031-17234-2_11]
                 [21]  Zou  J,  Zou  HK,  Dong  XY,  Wu  WL,  Luo  YY.  New  key  recovery  attack  based  on  periodic  property.  Ruan  Jian  Xue  Bao/Journal  of
                     Software, 2023, 34(9): 4239–4255 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/6636.htm [doi: 10.13328/j.cnki.
                     jos.006636]
                 [22]  Vaudenay S. On the Lai-Massey scheme. In: Proc. of the 1999 Int’l Conf. on the Theory and Application of Cryptology and Information
                     Security. Singapore: Springer, 1999. 8–19. [doi: 10.1007/978-3-540-48000-6_2]
                 [23]  Luo YY, Lai XJ, Hu J. The pseudorandomness of many-round Lai-Massey scheme. Journal of Information Science and Engineering,
                     2015, 31(1): 1085–1096]
                 [24]  Luo YY, Yan HL, Wang L, Hu HG, Lai XJ. Study on block cipher structures against Simon’s quantum algorithm. Journal of Cryptologic
                     Research, 2019, 6(5): 561–573 (in Chinese with English abstract). [doi: 10.13868/j.cnki.jcr.000322]
                 [25]  Gouget A, Patarin J, Toulemonde A. (Quantum) Cryptanalysis of Misty schemes. In: Proc. of the 23rd Int’l Conf. on Information Security
                     and Cryptology. Seoul: Springer, 2020. 43–57. [doi: 10.1007/978-3-030-68890-5_3]
                 [26]  Adams C, Gilchrist J. The CAST-256 encryption algorithm. RFC 2612, 1999. [doi: 10.17487/RFC2612]
                 [27]  Deng YH, Jin CH, Li RJ. Meet in the middle attack on Type-1 Feistel construction. In: Proc. of the 13th Int’l Conf. on Information
                     Security and Cryptology. Xi’an: Springer, 2018. 427–444. [doi: 10.1007/978-3-319-75160-3_25]
                 [28]  Ni BY, Ito G, Dong XY, Iwata T. Quantum attacks against Type-1 generalized Feistel ciphers and applications to CAST-256. In: Proc. of
                     the 20th Int’l Conf. on Cryptology in India. Hyderabad: Springer, 2019. 433–455. [doi: 10.1007/978-3-030-35423-7_22]
                 [29]  Diffie W, Ledin G. SMS4 encryption algorithm for wireless networks. IACR Cryptology ePrint Archive, 2008, 2008: 329.
                 [30]  You QD, Qian X, Zhou X, Yuan Y, Wu ZY. Research on quantum cryptanalysis on SMS4-like structure and NBC algorithm. Journal of
                     Cryptologic Research, 2020, 7(6): 864–874. (in Chinese with English abstract). [doi: 10.13868/j.cnki.jcr.000412]
   411   412   413   414   415   416   417   418   419   420   421