Acknowledgement
This work was supported by Institute for Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government(MSIT) (<Q|Crypton>, No.2019-0-00033, Study on Quantum Security Evaluation of Cryptography based on Computational Quantum Complexity, 100%).
References
- NIST, "Post-Quantum Cryptography Selected Algorithm 2022," [internet], https://csrc.nist.gov/Projects/post-quantum-cryptography/selected-algorithms-2022.
- NIST, "Post-Quantum Cryptography Round 4 Submissions," [internet], https://csrc.nist.gov/Projects/post-quantum-cryptography/round-4-submissions.
- L. K. Grover, "A fast quantum mechanical algorithm for database search," Proceedings of the Twenty-eighth Annual ACM Symposium on Theory of Computing, pp.212-219, 1996.
- NIST, "Submission requirements and evaluation criteria for the post-quantum cryptography standardization process," [internet], https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/documents/call-for-proposals-final-dec-2016.pdf.
- M. Grassl, B. Langenberg, M. Roetteler, and R. Steinwandt, "Applying Grover's algorithm to AES: Quantum resource estimates," Post-Quantum Crypto Graphy, PQCrypto'16, LNCS, 9606, pp.29-43, 2016.
- S. Jaques, M. Naehrig, M. Roetteler, and F. Virdia, "Implementing Grover oracles for quantum key search on AES and LowMC," Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, pp.280-310, 2020.
- R. Anand, A. Maitra, and S. Mukhopadhyay, "Grover on SIMON," arXiv:2004.10686, 2020.
- K. B. Jang, G. J. Song, H. J. Kim, H. D. Kwon, H, J. Kim, and H. J. Seo, "Efficient implementation of PRESENT and GIFT on quantum computers," Applied Sciences, Vol.11, No.11, pp.4776, 2021. https://doi.org/10.3390/app11114776
- K. B. Jang, G. J. Song, H. D. Kwon, S. W. Uhm, H. J. Kim, W. K. Lee, and H. J. Seo, "Grover on PIPO," Electronics, Vol.10, No.10, pp.1194, 2021. https://doi.org/10.3390/electronics10101194
- A. Baksi, K. B. Jang, G. J. Song, H. J. Seo, and Z. Xiang, "Quantum implementation and resource estimates for rectangle and knot," Quantum Information Processing, Vol.21, No.7, 2021.
- C. Beierle et al., "Schwaemm and esch: Lightweight authenticated encryption and hashing using the Sparkle permutation family," NIST round, 2, 2019.
- B. I. Kim, K. S. Min, and J. Heo, "Hamiltonian path problem approach using Grover search algorithm," The Journal of Communications and Networks, Vol.2020, No.8, pp.52-53, 2020.
- S. A. Cuccaro, T. G. Draper, S. A. Kutin, and D. P. Moulton, "A new quantum ripple-carry addition circuit," arXiv preprint quant-ph/0410184, 2004.
- T. G. Draper, S. A. Kutin, E. M. Rains, and K. M. Svore, "A logarithmic-depth quantum carry- lookahead adder," arXiv preprint quant-ph/0406142, 2004.
- H. Thapliyal, H. V. Jayashree, A. N. Nagamani, and H. R. Arabnia, "Progress in reversible processor design: A novel methodology for reversible carry look-ahead adder," In: Transactions on Computational Science XVII. Springer, Berlin, Heidelberg, pp.73-97, 2013.
- Y. Takahashi, S. Tani, and N. Kunihiro, "Quantum addition circuits and unbounded fan-out," arXiv preprint arXiv:0910.2530, 2009.
- K. B. Jang, A. Baksi, G. J. Song, H. J. Kim, H. J. Seo, and A. Chattopadhyay, "Quantum Analysis of AES," Cryptology ePrint Archive, 2022.