Oct. 13, 2023, 12:48 p.m. |

IACR News www.iacr.org

ePrint Report: Optimized Quantum Implementation of SEED

Yujin Oh, Kyungbae Jang, Yujin Yang, Hwajeong Seo


With the advancement of quantum computers, it has been demonstrated that Shor's algorithm enables public key cryptographic attacks to be performed in polynomial time. In response, NIST conducted a Post-Quantum Cryptography Standardization competition. Additionally, due to the potential reduction in the complexity of symmetric key cryptographic attacks to square root with Grover's algorithm, it is increasingly challenging to consider symmetric key cryptography as secure. In …

advancement algorithm attacks competition computers cryptographic cryptography eprint report implementation key nist post-quantum post-quantum cryptography public public key quantum quantum computers quantum cryptography report response seed seo shor standardization

Financial Crimes Compliance - Senior - Consulting - Location Open

@ EY | New York City, US, 10001-8604

Software Engineer - Cloud Security

@ Neo4j | Malmö

Security Consultant

@ LRQA | Singapore, Singapore, SG, 119963

Identity Governance Consultant

@ Allianz | Sydney, NSW, AU, 2000

Educator, Cybersecurity

@ Brain Station | Toronto

Principal Security Engineer

@ Hippocratic AI | Palo Alto