{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:43:06Z","timestamp":1742913786700,"version":"3.40.3"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031400025"},{"type":"electronic","value":"9783031400032"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-40003-2_18","type":"book-chapter","created":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T13:03:04Z","timestamp":1691586184000},"page":"476-504","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Breaking the\u00a0Quadratic Barrier: Quantum Cryptanalysis of\u00a0Milenage, Telecommunications\u2019 Cryptographic Backbone"],"prefix":"10.1007","author":[{"given":"Vincent Quentin","family":"Ulitzsch","sequence":"first","affiliation":[]},{"given":"Jean-Pierre","family":"Seifert","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,10]]},"reference":[{"key":"18_CR1","unstructured":"3GPP: ETSI TR 135 102. Technical Report (TR) 35.102, 3rd Generation Partnership Project (3GPP) (2013). https:\/\/www.etsi.org\/deliver\/etsi_ts\/133100_133199\/133102\/11.05.01_60\/ts_133102v110501p.pdf, version 11.5.1"},{"key":"18_CR2","unstructured":"3GPP: ETSI TR 135 231. Technical Report (TR) 35.231, 3rd Generation Partnership Project (3GPP) (2014). https:\/\/www.etsi.org\/deliver\/etsi_ts\/135200_135299\/135231\/12.01.00_60\/ts_135231v120100p.pdf, version 12.1.0"},{"key":"18_CR3","unstructured":"3GPP: ETSI TR 135 206. Technical Report (TR) 35.206, 3rd Generation Partnership Project (3GPP) (2016). https:\/\/www.etsi.org\/deliver\/etsi_ts\/135200_135299\/135206\/14.00.00_60\/ts_135206v140000p.pdf, version 14.0.0"},{"key":"18_CR4","unstructured":"3GPP: ETSI TR 135 909. Technical Report (TR) 35.909, 3rd Generation Partnership Project (3GPP) (2019). https:\/\/www.etsi.org\/deliver\/etsi_tr\/135900_135999\/135909\/07.00.00_60\/tr_135909v070000p.pdf, version 15.0.0"},{"key":"18_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-319-39555-5_2","volume-title":"Applied Cryptography and Network Security","author":"S Alt","year":"2016","unstructured":"Alt, S., Fouque, P.-A., Macario-rat, G., Onete, C., Richard, B.: A cryptographic analysis of UMTS\/LTE AKA. In: Manulis, M., Sadeghi, A.-R., Schneider, S. (eds.) ACNS 2016. LNCS, vol. 9696, pp. 18\u201335. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-39555-5_2"},{"key":"18_CR6","unstructured":"Aumasson, J.P.: Too much crypto. Cryptology ePrint Archive (2019)"},{"issue":"4","key":"18_CR7","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/BF00203965","volume":"7","author":"E Biham","year":"1994","unstructured":"Biham, E.: New types of cryptanalytic attacks using related keys. J. Cryptol. 7(4), 229\u2013246 (1994). https:\/\/doi.org\/10.1007\/BF00203965","journal-title":"J. Cryptol."},{"key":"18_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-88238-9_1","volume-title":"Progress in Cryptology \u2013 LATINCRYPT 2021","author":"X Bonnetain","year":"2021","unstructured":"Bonnetain, X.: Tight bounds for Simon\u2019s algorithm. In: Longa, P., R\u00e0fols, C. (eds.) LATINCRYPT 2021. LNCS, vol. 12912, pp. 3\u201323. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-88238-9_1"},{"key":"18_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1007\/978-3-030-34578-5_20","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2019","author":"X Bonnetain","year":"2019","unstructured":"Bonnetain, X., Hosoyamada, A., Naya-Plasencia, M., Sasaki, Yu., Schrottenloher, A.: Quantum attacks without superposition queries: the offline Simon\u2019s algorithm. In: Galbraith, S.D., Moriai, S. (eds.) ASIACRYPT 2019. LNCS, vol. 11921, pp. 552\u2013583. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-34578-5_20"},{"key":"18_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/978-3-031-07082-2_12","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2022","author":"X Bonnetain","year":"2022","unstructured":"Bonnetain, X., Schrottenloher, A., Sibleyras, F.: Beyond quadratic speedups in quantum attacks on symmetric schemes. In: Dunkelman, O., Dziembowski, S. (eds.) EUROCRYPT 2022. Lecture Notes in Computer Science, vol. 13277, pp. 315\u2013344. Springer International Publishing, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-07082-2_12"},{"key":"18_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/978-3-031-23020-2_14","volume-title":"Network and System Security, NSS 2022","author":"MT Damir","year":"2022","unstructured":"Damir, M.T., Meskanen, T., Ramezanian, S., Niemi, V.: A beyond-5G authentication and key agreement protocol. In: Yuan, X., Bai, G., Alcaraz, C., Majumdar, S. (eds.) Network and System Security, NSS 2022. Lecture Notes in Computer Science, vol. 13787, pp. 249\u2013264. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-23020-2_14"},{"issue":"6","key":"18_CR12","doi-asserted-by":"publisher","first-page":"1179","DOI":"10.1007\/s10623-020-00741-y","volume":"88","author":"X Dong","year":"2020","unstructured":"Dong, X., Dong, B., Wang, X.: Quantum attacks on some Feistel block ciphers. Des. Codes Crypt. 88(6), 1179\u20131203 (2020)","journal-title":"Des. Codes Crypt."},{"issue":"4","key":"18_CR13","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/3512996","volume":"65","author":"GP Fettweis","year":"2022","unstructured":"Fettweis, G.P., Boche, H.: On 6G and trustworthiness. Commun. ACM 65(4), 48\u201349 (2022)","journal-title":"Commun. ACM"},{"key":"18_CR14","unstructured":"Fluhrer, S.: Reassessing Grover\u2019s algorithm. Cryptology ePrint Archive (2017)"},{"issue":"4","key":"18_CR15","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1515\/popets-2016-0039","volume":"2016","author":"PA Fouque","year":"2016","unstructured":"Fouque, P.A., Onete, C., Richard, B.: Achieving better privacy for the 3GPP AKA protocol. Proc. Priv. Enhancing Technol. 2016(4), 255\u2013275 (2016). https:\/\/doi.org\/10.1515\/popets-2016-0039","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"18_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1007\/978-3-540-39887-5_27","volume-title":"Fast Software Encryption","author":"H Gilbert","year":"2003","unstructured":"Gilbert, H.: The security of \u201cone-block-to-many\u2019\u2019 modes of operation. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 376\u2013395. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-39887-5_27"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the twenty-eighth annual ACM symposium on Theory of computing, pp. 212\u2013219 (1996)","DOI":"10.1145\/237814.237866"},{"key":"18_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-030-90459-3_8","volume-title":"Theory of Cryptography","author":"J Jaeger","year":"2021","unstructured":"Jaeger, J., Song, F., Tessaro, S.: Quantum key-length extension. In: Nissim, K., Waters, B. (eds.) TCC 2021. LNCS, vol. 13042, pp. 209\u2013239. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-90459-3_8"},{"key":"18_CR19","unstructured":"Jang, K., Baksi, A., Kim, H., Song, G., Seo, H., Chattopadhyay, A.: Quantum analysis of AES - lowering limit of quantum attack complexity (2022)"},{"key":"18_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/978-3-030-81652-0_13","volume-title":"Selected Areas in Cryptography","author":"S Jaques","year":"2021","unstructured":"Jaques, S., Schrottenloher, A.: Low-gate quantum golden collision\u00a0finding. In: Dunkelman, O., Jacobson, Jr., M.J., O\u2019Flynn, C. (eds.) SAC 2020. LNCS, vol. 12804, pp. 329\u2013359. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-81652-0_13"},{"key":"18_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/978-3-662-53008-5_8","volume-title":"Advances in Cryptology \u2013 CRYPTO 2016","author":"M Kaplan","year":"2016","unstructured":"Kaplan, M., Leurent, G., Leverrier, A., Naya-Plasencia, M.: Breaking symmetric cryptosystems using\u00a0quantum\u00a0period finding. In: Robshaw, M., Katz, J. (eds.) CRYPTO 2016. LNCS, vol. 9815, pp. 207\u2013237. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53008-5_8"},{"key":"18_CR22","doi-asserted-by":"publisher","unstructured":"Kaplan, M., Leurent, G., Leverrier, A., Naya-Plasencia, M.: Quantum differential and linear cryptanalysis. IACR Trans. Symmetric Cryptology 2016(1), 71\u201394 (2016). https:\/\/doi.org\/10.13154\/tosc.v2016.i1.71-94, https:\/\/tosc.iacr.org\/index.php\/ToSC\/article\/view\/536. ISSN 2519\u2013173X","DOI":"10.13154\/tosc.v2016.i1.71-94"},{"key":"18_CR23","doi-asserted-by":"crossref","unstructured":"Kuwakado, H., Morii, M.: Quantum distinguisher between the 3-round Feistel cipher and the random permutation. In: 2010 IEEE International Symposium on Information Theory, pp. 2682\u20132685. IEEE (2010)","DOI":"10.1109\/ISIT.2010.5513654"},{"key":"18_CR24","unstructured":"Kuwakado, H., Morii, M.: Security on the quantum-type Even-Mansour cipher. In: 2012 International Symposium on Information Theory and its Applications, pp. 312\u2013316. IEEE (2012)"},{"key":"18_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-319-70697-9_6","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2017","author":"G Leander","year":"2017","unstructured":"Leander, G., May, A.: Grover meets Simon \u2013 quantumly attacking the FX-construction. In: Takagi, T., Peyrin, T. (eds.) ASIACRYPT 2017. LNCS, vol. 10625, pp. 161\u2013178. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70697-9_6"},{"key":"18_CR26","unstructured":"Mayes, K., Babbage, S., Maximov, A.: Performance evaluation of the new Tuak mobile authentication algorithm. Proc. ICONS\/EMBEDDED, 38\u201344 (2016)"},{"key":"18_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101825","volume":"93","author":"CJ Mitchell","year":"2020","unstructured":"Mitchell, C.J.: The impact of quantum computing on real-world security: a 5g case study. Comput. Secur. 93, 101825 (2020)","journal-title":"Comput. Secur."},{"key":"18_CR28","unstructured":"NIST: Submission requirements and evaluation criteria for the post-quantum cryptography standardization process. Technical report, National Institute of Standards and Technology (NIST), Washington, D.C. (2017). https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/post-quantum-cryptography-standardization"},{"key":"18_CR29","unstructured":"NIST: Announcing four candidates to be standardized, plus fourth round candidates (2022). https:\/\/csrc.nist.gov\/News\/2022\/pqc-candidates-to-be-standardized-and-round-4#fourth-round"},{"key":"18_CR30","unstructured":"Piani, M., Mosca, M.: Quantum threat timeline report 2021 (2021)"},{"key":"18_CR31","unstructured":"PlankQK: Plankqk: Konsortium (2022). https:\/\/planqk.stoneone.de\/partner\/"},{"key":"18_CR32","volume-title":"Quantum Computing: A Gentle Introduction","author":"EG Rieffel","year":"2011","unstructured":"Rieffel, E.G., Polak, W.H.: Quantum Computing: A Gentle Introduction. MIT Press, Cambridge (2011)"},{"issue":"1","key":"18_CR33","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.ipl.2014.08.009","volume":"115","author":"M Roetteler","year":"2015","unstructured":"Roetteler, M., Steinwandt, R.: A note on quantum related-key attacks. Inf. Process. Lett. 115(1), 40\u201344 (2015)","journal-title":"Inf. Process. Lett."},{"issue":"5","key":"18_CR34","doi-asserted-by":"publisher","first-page":"1067","DOI":"10.1137\/S0097539704412910","volume":"33","author":"RA Servedio","year":"2004","unstructured":"Servedio, R.A., Gortler, S.J.: Equivalences and separations between quantum and classical learnability. SIAM J. Comput. 33(5), 1067\u20131092 (2004)","journal-title":"SIAM J. Comput."},{"issue":"5","key":"18_CR35","doi-asserted-by":"publisher","first-page":"1474","DOI":"10.1137\/S0097539796298637","volume":"26","author":"DR Simon","year":"1997","unstructured":"Simon, D.R.: On the power of quantum computation. SIAM J. Comput. 26(5), 1474\u20131483 (1997)","journal-title":"SIAM J. Comput."},{"key":"18_CR36","doi-asserted-by":"crossref","unstructured":"Ulitzsch, V.Q., Park, S., Marzougui, S., Seifert, J.P.: A post-quantum secure subscription concealed identifier for 6G. In: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 157\u2013168 (2022)","DOI":"10.1145\/3507657.3528540"},{"issue":"1","key":"18_CR37","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1080\/0161-118791861749","volume":"11","author":"R Winternitz","year":"1987","unstructured":"Winternitz, R., Hellman, M.: Chosen-key attacks on a block cipher. Cryptologia 11(1), 16\u201320 (1987)","journal-title":"Cryptologia"},{"issue":"12","key":"18_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-019-2907-4","volume":"63","author":"J Yang","year":"2020","unstructured":"Yang, J., Johansson, T.: An overview of cryptographic primitives for possible use in 5g and beyond. Sci. China Inf. Sci. 63(12), 1\u201322 (2020)","journal-title":"Sci. China Inf. Sci."},{"key":"18_CR39","doi-asserted-by":"crossref","unstructured":"Zhandry, M.: How to construct quantum random functions. In: 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science, pp. 679\u2013687. IEEE (2012)","DOI":"10.1109\/FOCS.2012.37"},{"key":"18_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1007\/978-3-030-64834-3_24","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2020","author":"J Zou","year":"2020","unstructured":"Zou, J., Wei, Z., Sun, S., Liu, X., Wu, W.: Quantum circuit implementations of AES with fewer qubits. In: Moriai, S., Wang, H. (eds.) ASIACRYPT 2020. LNCS, vol. 12492, pp. 697\u2013726. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-64834-3_24"}],"container-title":["Lecture Notes in Computer Science","Post-Quantum Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-40003-2_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T13:05:20Z","timestamp":1691586320000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-40003-2_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031400025","9783031400032"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-40003-2_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"10 August 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PQCrypto","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Post-Quantum Cryptography","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"College Park, MD","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 August 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 August 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pqcrypto2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/pqcrypto2023.umiacs.io\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"51","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"49% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.16","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.30","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}