Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Alternative Tower Field Construction for Quantum Implementation of the AES S-Box

Full metadata record
DC Field Value Language
dc.contributor.authorChung, D.-
dc.contributor.authorLee, S.-
dc.contributor.authorChoi, D.-
dc.contributor.authorLee, J.-
dc.date.accessioned2022-12-11T14:40:18Z-
dc.date.available2022-12-11T14:40:18Z-
dc.date.created2022-12-08-
dc.date.issued2022-
dc.identifier.issn0018-9340-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/147021-
dc.description.abstractGrover's search algorithm allows a quantum adversary to find a kk-bit secret key of a block cipher by making O(2k/2) block cipher queries. Resistance of a block cipher to such an attack is evaluated by quantum resources required to implement Grover's oracle for the target cipher. The quantum resources are typically estimated by the T-depth of its circuit implementation and the number of qubits used by the circuit (width). Since the AES S-box is the only component which requires T-gates in a quantum implementation of AES, recent research has put its focus on efficient implementation of the AES S-box. However, any efficient implementation with low T-depth will not be practical in the real world without considering qubit consumption of the implementation. In this work, we propose three methods of trade-off between time and space for the quantum implementation of the AES S-box. In particular, one of our methods turns out to use the smallest number of qubits among the existing methods, significantly reducing its T-depth. © 1968-2012 IEEE.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherIEEE Computer Society-
dc.titleAlternative Tower Field Construction for Quantum Implementation of the AES S-Box-
dc.typeArticle-
dc.contributor.affiliatedAuthorChoi, D.-
dc.identifier.doi10.1109/TC.2021.3135759-
dc.identifier.scopusid2-s2.0-85121811824-
dc.identifier.bibliographicCitationIEEE Transactions on Computers, v.71, no.10, pp.2553 - 2564-
dc.relation.isPartOfIEEE Transactions on Computers-
dc.citation.titleIEEE Transactions on Computers-
dc.citation.volume71-
dc.citation.number10-
dc.citation.startPage2553-
dc.citation.endPage2564-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.subject.keywordAuthorAES-
dc.subject.keywordAuthorGrover&apos-
dc.subject.keywordAuthors algorithm-
dc.subject.keywordAuthormultiplicative inversion-
dc.subject.keywordAuthorquantum cryptanalysis-
dc.subject.keywordAuthorQuantum implementation-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Science and Technology > Department of AI Cyber Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE