{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:45:28Z","timestamp":1767321928852,"version":"3.48.0"},"publisher-location":"Singapore","reference-count":33,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819562053","type":"print"},{"value":"9789819562060","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-6206-0_24","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:43:19Z","timestamp":1767321799000},"page":"460-478","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Distributed Quantum Key Recovery Attack on\u00a0Pseudorandom Functions"],"prefix":"10.1007","author":[{"given":"Kun","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Tao","family":"Shang","sequence":"additional","affiliation":[]},{"given":"Yuanjing","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jianwei","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Avron, J., Casper, O., Rozen, I.: Quantum advantage and noise reduction in distributed quantum computing. Phys. Rev. A 104(5) (2021)","DOI":"10.1103\/PhysRevA.104.052404"},{"key":"24_CR2","doi-asserted-by":"crossref","unstructured":"Bernstein, E., Vazirani, U.: Quantum complexity theory. In: Proceedings of the 25th Annual ACM Symposium on Theory of Computing, pp. 11\u201320 (1993)","DOI":"10.1145\/167088.167097"},{"key":"24_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1007\/978-3-030-34578-5_20","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2019","author":"X Bonnetain","year":"2019","unstructured":"Bonnetain, X., Hosoyamada, A., Naya-Plasencia, M., Sasaki, Yu., Schrottenloher, A.: Quantum attacks without superposition queries: the offline Simon\u2019s algorithm. In: Galbraith, S.D., Moriai, S. (eds.) ASIACRYPT 2019. LNCS, vol. 11921, pp. 552\u2013583. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-34578-5_20"},{"key":"24_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/978-3-030-92062-3_15","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2021","author":"X Bonnetain","year":"2021","unstructured":"Bonnetain, X., Leurent, G., Naya-Plasencia, M., Schrottenloher, A.: Quantum linearization attacks. In: Tibouchi, M., Wang, H. (eds.) ASIACRYPT 2021. LNCS, vol. 13090, pp. 422\u2013452. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-92062-3_15"},{"key":"24_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/978-3-031-07082-2_12","volume-title":"Advances in Cryptology - EUROCRYPT 2022","author":"X Bonnetain","year":"2022","unstructured":"Bonnetain, X., Schrottenloher, A., Sibleyras, F.: Beyond quadratic speedups in quantum attacks on symmetric schemes. In: Dunkelman, O., Dziembowski, S. (eds.) EUROCRYPT 2022. LNCS, vol. 13277, pp. 315\u2013344. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-07082-2_12"},{"key":"24_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1007\/978-3-030-26948-7_10","volume-title":"Advances in Cryptology \u2013 CRYPTO 2019","author":"YL Chen","year":"2019","unstructured":"Chen, Y.L., Lambooij, E., Mennink, B.: How to build pseudorandom functions from public random permutations. In: Boldyreva, A., Micciancio, D. (eds.) CRYPTO 2019. LNCS, vol. 11692, pp. 266\u2013293. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-26948-7_10"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Dong, X.Y., Wang, X.Y.: Quantum key-recovery attack on feistel structures. Sci. China-Inf. Sci. 61(10) (2018)","DOI":"10.1007\/s11432-017-9468-y"},{"issue":"2","key":"24_CR8","doi-asserted-by":"publisher","first-page":"31","DOI":"10.46586\/tosc.v2021.i2.31-70","volume":"2021","author":"A Dutta","year":"2021","unstructured":"Dutta, A., Nandi, M., Talnikar, S.: Permutation based EDM: an inverse free BBB secure PRF. IACR Transa. Symmetric Cryptol. 2021(2), 31\u201370 (2021)","journal-title":"IACR Transa. Symmetric Cryptol."},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, pp. 212\u2013219 (1996)","DOI":"10.1145\/237814.237866"},{"key":"24_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-64200-0_1","volume-title":"Advances in Information and Computer Security","author":"A Hosoyamada","year":"2017","unstructured":"Hosoyamada, A., Aoki, K.: On quantum related-key attacks on iterated Even-Mansour ciphers. In: Obana, S., Chida, K. (eds.) IWSEC 2017. LNCS, vol. 10418, pp. 3\u201318. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-64200-0_1"},{"key":"24_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/978-3-319-98113-0_21","volume-title":"Security and Cryptography for Networks","author":"A Hosoyamada","year":"2018","unstructured":"Hosoyamada, A., Sasaki, Yu.: Quantum Demiric-Sel\u00e7uk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions. In: Catalano, D., De Prisco, R. (eds.) SCN 2018. LNCS, vol. 11035, pp. 386\u2013403. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-98113-0_21"},{"key":"24_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1007\/978-3-642-10433-6_22","volume-title":"Cryptology and Network Security","author":"M Izadi","year":"2009","unstructured":"Izadi, M., Sadeghiyan, B., Sadeghian, S.S., Khanooki, H.A.: MIBS: a new lightweight block cipher. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 334\u2013348. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-10433-6_22"},{"key":"24_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/978-3-662-53008-5_8","volume-title":"Advances in Cryptology \u2013 CRYPTO 2016","author":"M Kaplan","year":"2016","unstructured":"Kaplan, M., Leurent, G., Leverrier, A., Naya-Plasencia, M.: Breaking symmetric cryptosystems using\u00a0quantum\u00a0period finding. In: Robshaw, M., Katz, J. (eds.) CRYPTO 2016. LNCS, vol. 9815, pp. 207\u2013237. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53008-5_8"},{"key":"24_CR14","doi-asserted-by":"crossref","unstructured":"Kuwakado, H., Morii, M.: Quantum distinguisher between the 3-round Feistel cipher and the random permutation. In: 2010 IEEE International Symposium on Information Theory, pp. 2682\u20132685 (2010)","DOI":"10.1109\/ISIT.2010.5513654"},{"key":"24_CR15","unstructured":"Kuwakado, H., Morii, M.: Security on the quantum-type Even-Mansour cipher. In: 2012 International Symposium on Information Theory and Its Applications, pp. 312\u2013316 (2012)"},{"key":"24_CR16","doi-asserted-by":"crossref","unstructured":"Li, H.W., Yang, L.: A quantum algorithm to approximate the linear structures of Boolean functions. Math. Struct. Comput. Sci. 28(1), 1\u201313 (2018)","DOI":"10.1017\/S0960129516000013"},{"key":"24_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/11593447_21","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"I Mantin","year":"2005","unstructured":"Mantin, I.: A practical attack on the fixed RC4 in the WEP mode. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 395\u2013411. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11593447_21"},{"key":"24_CR18","doi-asserted-by":"crossref","unstructured":"Nan, J.H., Hu, H.G., Zhang, P., Luo, Y.Y.: Quantum attacks against BBB secure PRFs or macs built from public random permutations. Quant. Inf. Process. 22 (2023)","DOI":"10.1007\/s11128-022-03774-5"},{"key":"24_CR19","doi-asserted-by":"crossref","unstructured":"Qiu, D.W., Luo, L., Xiao, L.G.: Distributed Grover\u2019s algorithm. Theor. Comput. Sci. 993 (2024)","DOI":"10.1016\/j.tcs.2024.114461"},{"key":"24_CR20","doi-asserted-by":"crossref","unstructured":"Robert, B., et al.: Efficient distributed quantum computing. Proc. Roy. Soc. A Math. Phys. Eng. Sci. 469(2153) (2013)","DOI":"10.1098\/rspa.2012.0686"},{"key":"24_CR21","doi-asserted-by":"crossref","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th Annual Symposium on Foundations of Computer Science, pp. 124\u2013134 (1994)","DOI":"10.1109\/SFCS.1994.365700"},{"issue":"5","key":"24_CR22","doi-asserted-by":"publisher","first-page":"1474","DOI":"10.1137\/S0097539796298637","volume":"26","author":"DR Simon","year":"1997","unstructured":"Simon, D.R.: On the power of quantum computation. SIAM J. Comput. 26(5), 1474\u20131483 (1997)","journal-title":"SIAM J. Comput."},{"key":"24_CR23","doi-asserted-by":"crossref","unstructured":"Sun, H.W., Cai, B.B., Qin, Wen, Q.Y., Gao, F.: Quantum attacks on beyond-birthday-bound macs. Physica A: Stat. Mech. Appl. (2023)","DOI":"10.1016\/j.physa.2023.129047"},{"key":"24_CR24","doi-asserted-by":"crossref","unstructured":"Tan, J.W., Xiao, L.G., Qiu, D.W., Luo, L., Mateus, P.: Distributed quantum algorithm for Simon\u2019s problem. Phys. Rev. A 106(3) (2022)","DOI":"10.1103\/PhysRevA.106.032417"},{"issue":"1\u20132","key":"24_CR25","first-page":"27","volume":"23","author":"LG Xiao","year":"2023","unstructured":"Xiao, L.G., Qiu, D.W., Luo, L., Mateus, P.: Distributed Shor\u2019s algorithm. Quant. Inf. Comput. 23(1\u20132), 27\u201344 (2023)","journal-title":"Quant. Inf. Comput."},{"key":"24_CR26","doi-asserted-by":"crossref","unstructured":"Xie, H.Q., Yang, L.: A quantum related-key attack based on the Bernstein-Vazirani algorithm. Quant. Inf. Process. 19(8) (2020)","DOI":"10.1007\/s11128-020-02741-2"},{"key":"24_CR27","doi-asserted-by":"crossref","unstructured":"Xie, H.Q., Zhao, Z.M., Wang, K., Li, Y.J., C., X.H.: Quantum attacks on MIBs block cipher based on Bernstein-Vazirani algorithm. Mathematics 12(17) (2024)","DOI":"10.3390\/math12172678"},{"issue":"8","key":"24_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-019-2364-9","volume":"18","author":"C-H Yu","year":"2019","unstructured":"Yu, C.-H., Gao, F., Lin, S., Wang, J.: Quantum data compression by principal component analysis. Quant. Inf. Process. 18(8), 1\u201320 (2019). https:\/\/doi.org\/10.1007\/s11128-019-2364-9","journal-title":"Quant. Inf. Process."},{"key":"24_CR29","doi-asserted-by":"crossref","unstructured":"Yu, C., Gao, F., Wang, Q., Wen, Q.: Quantum algorithm for association rules mining. Phys. Rev. A 94(4) (2016)","DOI":"10.1103\/PhysRevA.94.042311"},{"key":"24_CR30","doi-asserted-by":"crossref","unstructured":"Zhang, S.X., Guo, C., Wang, Q.J.: Superposition attacks on pseudorandom schemes based on two or less permutations. IET Inf. Secur. (2024)","DOI":"10.1049\/2024\/9991841"},{"key":"24_CR31","doi-asserted-by":"crossref","unstructured":"Zhang, P., Luo, Y.Y.: Breaking permutation-based pseudorandom cryptographic schemes using distributed exact quantum algorithms. Quant. Inf. Process. 23(6) (2024)","DOI":"10.1007\/s11128-024-04424-8"},{"key":"24_CR32","doi-asserted-by":"crossref","unstructured":"Zhou, X., Qiu, D.W., Luo, L.: Distributed exact Grover\u2019s algorithm. Front. Phys. 18(5) (2023)","DOI":"10.1007\/s11467-023-1327-x"},{"key":"24_CR33","unstructured":"Zhou, X., Qiu, D.W., Luo, L.: Distributed exact quantum algorithms for Bernstein-Vazirani and search problems (2023). https:\/\/arxiv.org\/abs\/2303.10670"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-6206-0_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:43:22Z","timestamp":1767321802000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-6206-0_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819562053","9789819562060"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-6206-0_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Inscrypt","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisc22025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/inscrypt2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}