notesum.ai
Published at December 6Quantum Security Analysis of the Key-Alternating Ciphers
quant-ph
cs.CR
Released Date: December 6, 2024
Authors: Chen Bai1, Mehdi Esmaili1, Atul Mantri1
Aff.: 1Virginia Tech

| Target | Setting | Upper Bound | Lower Bound |
|---|---|---|---|
| KAC | Classical | [Dae93] | [EM97] |
| [KM12, BHNP+19a] | [ABKM22] | ||
| [KM12] | - | ||
| 2-KAC | [CGL22] | - | |
| 4-KAC | (two alternated keys) | [AGIS24] | - |
| -KAC | Classical | [BKL+12] | [CS14] |
| -KAC | Classical (same key/permutation) | [CLL+18] | - |
| -KAC | (same key/permutation) | [KLLNP16] | - |
| -KAC | ( equal keys) | Subsection 3.3 | - |
| -KAC | (for ) | ||
| (Theorem 3.4) | (Theorem 4.5) | ||
| -KAC | (Theorem 3.4) | - |