{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T13:39:35Z","timestamp":1770471575470,"version":"3.49.0"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032133007","type":"print"},{"value":"9783032133014","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T00:00:00Z","timestamp":1765411200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T00:00:00Z","timestamp":1765411200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-13301-4_15","type":"book-chapter","created":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T09:12:44Z","timestamp":1765357964000},"page":"339-364","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["New Results in\u00a0Quantum Analysis of\u00a0LED: Featuring One and\u00a0Two Oracle Attacks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-9128-1857","authenticated-orcid":false,"given":"Siyi","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5963-7127","authenticated-orcid":false,"given":"Kyungbae","family":"Jang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5639-7372","authenticated-orcid":false,"given":"Anubhab","family":"Baksi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0260-9891","authenticated-orcid":false,"given":"Sumanta","family":"Chakraborty","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-6274-0719","authenticated-orcid":false,"given":"Bryan","family":"Lee","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8818-6983","authenticated-orcid":false,"given":"Anupam","family":"Chattopadhyay","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0069-9061","authenticated-orcid":false,"given":"Hwajeong","family":"Seo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,11]]},"reference":[{"key":"15_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/978-3-319-69453-5_18","volume-title":"Selected Areas in Cryptography \u2013 SAC 2016","author":"M Amy","year":"2017","unstructured":"Amy, M., Di Matteo, O., Gheorghiu, V., Mosca, M., Parent, A., Schanck, J.: Estimating the cost of generic quantum pre-image attacks on SHA-2 and SHA-3. In: Avanzi, R., Heys, H. (eds.) SAC 2016. LNCS, vol. 10532, pp. 317\u2013337. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-69453-5_18"},{"key":"15_CR2","doi-asserted-by":"publisher","unstructured":"Amy, M., Maslov, D., Mosca, M., Roetteler, M., Roetteler, M.: A meet-in-the-middle algorithm for fast synthesis of depth-optimal quantum circuits. IEEE Trans. Comput.-Aided Des. Integrated Circuits Syst. 32(6), 818\u2013830 (2013). https:\/\/doi.org\/10.1109\/TCAD.2013.2244643","DOI":"10.1109\/TCAD.2013.2244643"},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-319-29360-8_4","volume-title":"Post-Quantum Cryptography","author":"MV Anand","year":"2016","unstructured":"Anand, M.V., Targhi, E.E., Tabia, G.N., Unruh, D.: Post-quantum security of the CBC, CFB, OFB, CTR, and XTS modes of operation. In: Takagi, T. (ed.) PQCrypto 2016. LNCS, vol. 9606, pp. 44\u201363. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-29360-8_4"},{"key":"15_CR4","doi-asserted-by":"publisher","unstructured":"Anand, R., Maitra, A., Mukhopadhyay, S.: Grover on Simon. Quantum Inf. Process. 19(9) (2020). https:\/\/doi.org\/10.1007\/s11128-020-02844-w","DOI":"10.1007\/s11128-020-02844-w"},{"key":"15_CR5","unstructured":"Baksi, A.: Classical and physical security of symmetric key cryptographic algorithms. Ph.D. thesis, School of Computer Science & Engineering, Nanyang Technological University, Singapore (2021). https:\/\/dr.ntu.edu.sg\/handle\/10356\/152003"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Baksi, A., et al.: Quantum implementation of linear and non-linear layers. In: IEEE International System-on-Chip Conference (SOCC) (2024)","DOI":"10.1109\/SOCC62300.2024.10737862"},{"key":"15_CR7","doi-asserted-by":"publisher","unstructured":"Baksi, A., Jang, K.: Quantum computing fundamental and cryptographic perspective, pp. 7\u201320. Springer, Singapore (2024). https:\/\/doi.org\/10.1007\/978-981-97-0025-7_2","DOI":"10.1007\/978-981-97-0025-7_2"},{"key":"15_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1007\/978-3-030-81645-2_30","volume-title":"Applied Cryptography and Network Security Workshops","author":"A Baksi","year":"2021","unstructured":"Baksi, A., Karmakar, B., Dasu, V.A.: POSTER: optimizing device implementation of linear layers with automated tools. In: Zhou, J., et al. (eds.) ACNS 2021. LNCS, vol. 12809, pp. 500\u2013504. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-81645-2_30"},{"key":"15_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"A Bogdanov","year":"2007","unstructured":"Bogdanov, A., et al.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450\u2013466. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74735-2_31"},{"key":"15_CR10","doi-asserted-by":"publisher","unstructured":"Boyer, M., Brassard, G., H\u00f8yer, P., Tapp, A.: Tight bounds on quantum searching. Fortschritte der Physik 46(4-5), 493\u2013505 (1998). https:\/\/doi.org\/10.1002\/(sici)1521-3978(199806)46:4\/5<493::aid-prop493>3.0.co;2-p","DOI":"10.1002\/(sici)1521-3978(199806)46:4\/5<493::aid-prop493>3.0.co;2-p"},{"issue":"2","key":"15_CR11","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.71.022316","volume":"71","author":"S Bravyi","year":"2005","unstructured":"Bravyi, S., Kitaev, A.: Universal quantum computation with ideal clifford gates and noisy ancillas. Phys. Rev. A-Atomic Mol. Opt. Phys. 71(2), 022316 (2005)","journal-title":"Phys. Rev. A-Atomic Mol. Opt. Phys."},{"key":"15_CR12","doi-asserted-by":"publisher","first-page":"1028014","DOI":"10.3389\/fphy.2022.1028014","volume":"10","author":"B Cai","year":"2022","unstructured":"Cai, B., Gao, F., Leander, G.: Quantum attacks on two-round even-mansour. Front. Phys. 10, 1028014 (2022)","journal-title":"Front. Phys."},{"key":"15_CR13","doi-asserted-by":"publisher","unstructured":"Chen, J., Liu, Q., Fan, Y., Wu, L., Li, B., Wang, M.: New SAT-based model for quantum circuit decision problem: searching for low-cost quantum implementation. IACR Commun. Cryptol. 1(1) (2024). https:\/\/doi.org\/10.62056\/anmmp-4c2h","DOI":"10.62056\/anmmp-4c2h"},{"issue":"4","key":"15_CR14","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1109\/JIOT.2014.2337336","volume":"1","author":"S Chen","year":"2014","unstructured":"Chen, S., Xu, H., Liu, D., Hu, B., Wang, H.: A vision of IoT: applications, challenges, and opportunities with china perspective. IEEE Internet Things J. 1(4), 349\u2013359 (2014)","journal-title":"IEEE Internet Things J."},{"key":"15_CR15","unstructured":"Chun, M., Baksi, A., Chattopadhyay, A.: Dorcis: depth optimized quantum implementation of substitution boxes. Cryptology ePrint Archive, Paper 2023\/286 (2023). https:\/\/eprint.iacr.org\/2023\/286"},{"key":"15_CR16","unstructured":"Courtois, N.T., Hulme, D., Mourouzis, T.: Solving circuit optimisation problems in cryptography and cryptanalysis. Cryptology ePrint Archive, Paper 2011\/475 (2011). https:\/\/eprint.iacr.org\/2011\/475"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Dasu, V.A., Baksi, A., Sarkar, S., Chattopadhyay, A.: Lighter-R: optimized reversible circuit implementation for sboxes. In: 2019 32nd IEEE International System-on-Chip Conference (SOCC), pp. 260\u2013265 (2019). https:\/\/api.semanticscholar.org\/CorpusID:218564036","DOI":"10.1109\/SOCC46988.2019.1570548320"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Davenport, J.H., Pring, B.: Improvements to quantum search techniques for block-ciphers, with applications to AES. In: International Conference on Selected Areas in Cryptography, pp. 360\u2013384. Springer, Cham (2020)","DOI":"10.1007\/978-3-030-81652-0_14"},{"issue":"1","key":"15_CR19","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1109\/TCSI.2023.3325559","volume":"71","author":"J Feng","year":"2024","unstructured":"Feng, J., Wei, Y., Zhang, F., Pasalic, E., Zhou, Y.: Novel optimized implementations of lightweight cryptographic s-boxes via sat solvers. IEEE Trans. Circuits Syst. I Regul. Pap. 71(1), 334\u2013347 (2024). https:\/\/doi.org\/10.1109\/TCSI.2023.3325559","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"issue":"1","key":"15_CR20","doi-asserted-by":"publisher","first-page":"1939","DOI":"10.1038\/srep01939","volume":"3","author":"AG Fowler","year":"2013","unstructured":"Fowler, A.G., Devitt, S.J., Jones, C.: Surface code implementation of block code state distillation. Sci. Rep. 3(1), 1939 (2013)","journal-title":"Sci. Rep."},{"key":"15_CR21","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-319-29360-8_3","volume-title":"Post-Quantum Cryptography","author":"M Grassl","year":"2016","unstructured":"Grassl, M., Langenberg, B., Roetteler, M., Steinwandt, R.: Applying Grover\u2019s algorithm to AES: quantum resource estimates. In: Takagi, T. (ed.) Post-Quantum Cryptography, pp. 29\u201343. Springer, Cham (2016)"},{"key":"15_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-642-23951-9_22","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"J Guo","year":"2011","unstructured":"Guo, J., Peyrin, T., Poschmann, A., Robshaw, M.: The LED block cipher. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 326\u2013341. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23951-9_22"},{"issue":"7","key":"15_CR23","doi-asserted-by":"publisher","first-page":"2350","DOI":"10.1007\/s10773-017-3389-4","volume":"56","author":"Y He","year":"2017","unstructured":"He, Y., Luo, M.X., Zhang, E., Wang, H.K., Wang, X.F.: Decompositions of n-qubit toffoli gates with linear circuit complexity. Int. J. Theor. Phys. 56(7), 2350\u20132361 (2017)","journal-title":"Int. J. Theor. Phys."},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"van Hoof, I.: Space-efficient quantum multiplication of polynomials for binary finite fields with sub-quadratic toffoli gate count. arXiv preprint arXiv:1910.02849 (2019)","DOI":"10.26421\/QIC20.9-10-1"},{"key":"15_CR25","unstructured":"Huang, Z., Sun, S.: Synthesizing quantum circuits of AES with lower t-depth and less qubits. Cryptology ePrint Archive, Report 2022\/620 (2022). https:\/\/eprint.iacr.org\/2022\/620"},{"key":"15_CR26","doi-asserted-by":"publisher","unstructured":"Jang, K., Choi, S., Kwon, H., Kim, H., Park, J., Seo, H.: Grover on Korean block ciphers. Appl. Sci. 10(18) (2020). https:\/\/doi.org\/10.3390\/app10186407. https:\/\/www.mdpi.com\/2076-3417\/10\/18\/6407","DOI":"10.3390\/app10186407"},{"key":"15_CR27","unstructured":"Jang, K., Baksi, A., Song, G., Kim, H., Seo, H., Chattopadhyay, A.: Quantum analysis of AES. Cryptology ePrint Archive, Paper 2022\/683 (2022). https:\/\/eprint.iacr.org\/2022\/683"},{"key":"15_CR28","unstructured":"Jang, K., Choi, S., Kwon, H., Seo, H.: Grover on SPECK: quantum resource estimates. Cryptology ePrint Archive, Report 2020\/640 (2020). https:\/\/eprint.iacr.org\/2020\/640"},{"key":"15_CR29","doi-asserted-by":"publisher","unstructured":"Jang, K., Song, G., Kim, H., Kwon, H., Seo, H.: Efficient implementation of present and gift on quantum computers. Appl. Sci. 11, 4776 (2021). https:\/\/doi.org\/10.3390\/app11114776","DOI":"10.3390\/app11114776"},{"key":"15_CR30","doi-asserted-by":"crossref","unstructured":"Jaques, S., Naehrig, M., Roetteler, M., Virdia, F.: Implementing grover oracles for quantum key search on AES and LOWMC (2019). https:\/\/arxiv.org\/abs\/1910.01700","DOI":"10.1007\/978-3-030-45724-2_10"},{"key":"15_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1007\/978-3-030-45724-2_10","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2020","author":"S Jaques","year":"2020","unstructured":"Jaques, S., Naehrig, M., Roetteler, M., Virdia, F.: Implementing Grover oracles for quantum key search on AES and LowMC. In: Canteaut, A., Ishai, Y. (eds.) EUROCRYPT 2020. LNCS, vol. 12106, pp. 280\u2013310. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-45724-2_10"},{"key":"15_CR32","unstructured":"Kimmel, S., Lin, C.Y.Y., Lin, H.H.: Oracles with costs. Communication and Cryptography, TQC (2015)"},{"issue":"4","key":"15_CR33","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1016\/j.bushor.2015.03.008","volume":"58","author":"I Lee","year":"2015","unstructured":"Lee, I., Lee, K.: The internet of things (IoT): applications, investments, and challenges for enterprises. Bus. Horiz. 58(4), 431\u2013440 (2015)","journal-title":"Bus. Horiz."},{"key":"15_CR34","unstructured":"Liu, Q., Preneel, B., Zhao, Z., Wang, M.: Improved quantum circuits for AES: reducing the depth and the number of qubits. Cryptology ePrint Archive, Paper 2023\/1417 (2023). https:\/\/eprint.iacr.org\/2023\/1417"},{"key":"15_CR35","unstructured":"NIST.: Submission requirements and evaluation criteria for the post-quantum cryptography standardization process (2016). https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/Post-Quantum-Cryptography\/documents\/call-for-proposals-final-dec-2016.pdf"},{"key":"15_CR36","unstructured":"NIST: Call for additional digital signature schemes for the post-quantum cryptography standardization process (2022). https:\/\/csrc.nist.gov\/csrc\/media\/Projects\/pqc-dig-sig\/documents\/call-for-proposals-dig-sig-sept-2022.pdf"},{"issue":"4","key":"15_CR37","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.87.042302","volume":"87","author":"P Selinger","year":"2013","unstructured":"Selinger, P.: Quantum circuits of t-depth one. Phys. Rev. A 87(4), 042302 (2013)","journal-title":"Phys. Rev. A"},{"key":"15_CR38","unstructured":"Shi, H., Feng, X.: Quantum circuits of AES with a low-depth linear layer and a new structure. Cryptology ePrint Archive, Paper 2024\/381 (2024). https:\/\/eprint.iacr.org\/2024\/381"},{"issue":"3","key":"15_CR39","first-page":"383","volume":"33","author":"M Song","year":"2023","unstructured":"Song, M., Jang, K., Song, G., Kim, W., Seo, H.: Quantum circuit implementation of the led block cipher with compact qubit. J. Korea Inst. Inf. Secur. Cryptol. 33(3), 383\u2013389 (2023)","journal-title":"J. Korea Inst. Inf. Secur. Cryptol."},{"key":"15_CR40","doi-asserted-by":"publisher","unstructured":"Steiger, D., H\u00e4ner, T., Troyer, M.: Projectq: an open source software framework for quantum computing. Quantum 2 (2016). https:\/\/doi.org\/10.22331\/q-2018-01-31-49","DOI":"10.22331\/q-2018-01-31-49"},{"key":"15_CR41","unstructured":"Wiebe, N., Roetteler, M.: Quantum arithmetic and numerical analysis using repeat-until-success circuits. arXiv preprint arXiv:1406.2040 (2014)"},{"key":"15_CR42","doi-asserted-by":"crossref","unstructured":"Xiang, Z., Zeng, X., Lin, D., Bao, Z., Zhang, S.: Optimizing implementations of linear layers. IACR Transactions on Symmetric Cryptology (2020)","DOI":"10.46586\/tosc.v2020.i2.120-145"},{"key":"15_CR43","doi-asserted-by":"crossref","unstructured":"Yuan, Y., Wu, W., Shi, T., Zhang, L., Zhang, Y.: A framework to improve the implementations of linear layers. IACR Trans. Symmetric Cryptol. 2024(2), 322\u2013347 (2024). https:\/\/tosc.iacr.org\/index.php\/ToSC\/article\/view\/11633","DOI":"10.46586\/tosc.v2024.i2.322-347"},{"key":"15_CR44","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1007\/978-3-030-64834-3_24","volume-title":"ASIACRYPT 2020","author":"J Zou","year":"2020","unstructured":"Zou, J., Wei, Z., Sun, S., Liu, X., Wu, W.: Quantum circuit implementations of AES with fewer qubits. In: Moriai, S., Wang, H. (eds.) ASIACRYPT 2020, pp. 697\u2013726. Springer, Cham (2020)"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 INDOCRYPT 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-13301-4_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T09:12:53Z","timestamp":1765357973000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-13301-4_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,11]]},"ISBN":["9783032133007","9783032133014"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-13301-4_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,11]]},"assertion":[{"value":"11 December 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INDOCRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology in India","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bhubaneshwar","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"indocrypt2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}