{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T03:53:16Z","timestamp":1773201196267,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":63,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819609437","type":"print"},{"value":"9789819609444","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0944-4_12","type":"book-chapter","created":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T05:55:42Z","timestamp":1733896542000},"page":"358-395","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Quantum Circuits of\u00a0AES with\u00a0a\u00a0Low-Depth Linear Layer and\u00a0a\u00a0New Structure"],"prefix":"10.1007","author":[{"given":"Haotian","family":"Shi","sequence":"first","affiliation":[]},{"given":"Xiutao","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,12]]},"reference":[{"issue":"5","key":"12_CR1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.70.052328","volume":"70","author":"S Aaronson","year":"2004","unstructured":"Aaronson, S., Gottesman, D.: Improved simulation of stabilizer circuits. Physical Review A 70(5), 052328 (2004)","journal-title":"Physical Review A"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Albrecht, M.R., Driessen, B., Kavun, E.B., Leander, G., Paar, C., Yal\u00e7\u0131n, T.: Block ciphers\u2013focus on the linear layer (feat. pride). In: Advances in Cryptology\u2013CRYPTO 2014: 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I 34. pp. 57\u201376. Springer (2014)","DOI":"10.1007\/978-3-662-44371-2_4"},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-018-1864-3","volume":"17","author":"M Almazrooie","year":"2018","unstructured":"Almazrooie, M., Samsudin, A., Abdullah, R., Mutter, K.N.: Quantum reversible circuit of AES-128. Quantum information processing 17, 1\u201330 (2018)","journal-title":"Quantum information processing"},{"issue":"10","key":"12_CR4","doi-asserted-by":"publisher","first-page":"1476","DOI":"10.1109\/TCAD.2014.2341953","volume":"33","author":"M Amy","year":"2014","unstructured":"Amy, M., Maslov, D., Mosca, M.: Polynomial-time T-depth optimization of clifford+ T circuits via matroid partitioning. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 33(10), 1476\u20131489 (2014)","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"issue":"6","key":"12_CR5","doi-asserted-by":"publisher","first-page":"818","DOI":"10.1109\/TCAD.2013.2244643","volume":"32","author":"M Amy","year":"2013","unstructured":"Amy, M., Maslov, D., Mosca, M., Roetteler, M.: A meet-in-the-middle algorithm for fast synthesis of depth-optimal quantum circuits. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 32(6), 818\u2013830 (2013)","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Avanzi, R.: The QARMA block cipher family. Almost MDS matrices over rings with zero divisors, nearly symmetric even-mansour constructions with non-involutory central rounds, and search heuristics for low-latency s-boxes. IACR Transactions on Symmetric Cryptology pp. 4\u201344 (2017)","DOI":"10.46586\/tosc.v2017.i1.4-44"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Banik, S., Bogdanov, A., Isobe, T., Shibutani, K., Hiwatari, H., Akishita, T., Regazzoni, F.: Midori: A block cipher for low energy. In: Advances in Cryptology\u2013ASIACRYPT 2015: 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29\u2013December 3, 2015, Proceedings, Part II 21. pp. 411\u2013436. Springer (2015)","DOI":"10.1007\/978-3-662-48800-3_17"},{"issue":"1","key":"12_CR8","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1587\/transfun.2020CIP0013","volume":"104","author":"S Banik","year":"2021","unstructured":"Banik, S., Funabiki, Y., Isobe, T.: Further results on efficient implementations of block cipher linear layers. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 104(1), 213\u2013225 (2021)","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"},{"key":"12_CR9","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/s10623-010-9391-y","volume":"56","author":"P Barreto","year":"2010","unstructured":"Barreto, P., Nikov, V., Nikova, S., Rijmen, V., Tischhauser, E.: Whirlwind: a new cryptographic hash function. Designs, codes and cryptography 56, 141\u2013162 (2010)","journal-title":"Designs, codes and cryptography"},{"key":"12_CR10","unstructured":"Barreto, P.S.: The Anubis block cipher. NESSIE (2000)"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Beierle, C., Jean, J., K\u00f6lbl, S., Leander, G., Moradi, A., Peyrin, T., Sasaki, Y., Sasdrich, P., Sim, S.M.: The SKINNY family of block ciphers and its low-latency variant MANTIS. In: Advances in Cryptology\u2013CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II 36. pp. 123\u2013153. Springer (2016)","DOI":"10.1007\/978-3-662-53008-5_5"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Borghoff, J., Canteaut, A., G\u00fcneysu, T., Kavun, E.B., Knezevic, M., Knudsen, L.R., Leander, G., Nikov, V., Paar, C., Rechberger, C., et\u00a0al.: Prince\u2013a low-latency block cipher for pervasive computing applications. In: Advances in Cryptology\u2013ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings 18. pp. 208\u2013225. Springer (2012)","DOI":"10.1007\/978-3-642-34961-4_14"},{"issue":"3","key":"12_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3474226","volume":"2","author":"TG de Brugi\u00e8re","year":"2021","unstructured":"de\u00a0Brugi\u00e8re, T.G., Baboulin, M., Valiron, B., Martiel, S., Allouche, C.: Gaussian elimination versus greedy methods for the synthesis of linear reversible circuits. ACM Transactions on Quantum Computing 2(3), 1\u201326 (2021)","journal-title":"ACM Transactions on Quantum Computing"},{"key":"12_CR14","unstructured":"Christof, B., Thorsten, K., Gregor, L.: Lightweight multiplication in gf (2n) with applications to mds matrices; crypto 2016. lncs 9814 (2016)"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Cid, C., Murphy, S., Robshaw, M.J.: Small scale variants of the AES. In: FSE. vol.\u00a03557, pp. 145\u2013162. Springer (2005)","DOI":"10.1007\/11502760_10"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Daemen, J., Rijmen, V.: The design of Rijndael, vol.\u00a02. Springer (2002)","DOI":"10.1007\/978-3-662-04722-4"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Datta, K., Shrivastav, V., Sengupta, I., Rahaman, H.: Reversible logic implementation of AES algorithm. In: 2013 8th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS). pp. 140\u2013144. IEEE (2013)","DOI":"10.1109\/DTIS.2013.6527794"},{"key":"12_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TQE.2021.3091648","volume":"2","author":"TG De Brugiere","year":"2021","unstructured":"De\u00a0Brugiere, T.G., Baboulin, M., Valiron, B., Martiel, S., Allouche, C.: Reducing the depth of linear reversible quantum circuits. IEEE Transactions on Quantum Engineering 2, 1\u201322 (2021)","journal-title":"IEEE Transactions on Quantum Engineering"},{"key":"12_CR19","unstructured":"Fowler, A.G.: Time-optimal quantum computation. arXiv preprint arXiv:1210.4626 (2012)"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Grassl, M., Langenberg, B., Roetteler, M., Steinwandt, R.: Applying grover\u2019s algorithm to AES: quantum resource estimates. In: International Workshop on Post-Quantum Cryptography. pp. 29\u201343. Springer (2016)","DOI":"10.1007\/978-3-319-29360-8_3"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the twenty-eighth annual ACM symposium on Theory of computing. pp. 212\u2013219 (1996)","DOI":"10.1145\/237814.237866"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Huang, Z., Sun, S.: Synthesizing quantum circuits of AES with lower T-depth and less qubits. In: International Conference on the Theory and Application of Cryptology and Information Security. pp. 614\u2013644. Springer (2022)","DOI":"10.1007\/978-3-031-22969-5_21"},{"key":"12_CR23","unstructured":"Jang, K., Baksi, A., Kim, H., Song, G., Seo, H., Chattopadhyay, A.: Quantum analysis of AES. Cryptology ePrint Archive (2022)"},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Jaques, S., Naehrig, M., Roetteler, M., Virdia, F.: Implementing grover oracles for quantum key search on AES and LowMC. In: Advances in Cryptology\u2013EUROCRYPT 2020: 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10\u201314, 2020, Proceedings, Part II 30. pp. 280\u2013310. Springer (2020)","DOI":"10.1007\/978-3-030-45724-2_10"},{"key":"12_CR25","unstructured":"Jean, J., Nikoli\u0107, I., Peyrin, T.: Joltik v1. 3. CAESAR Round 2 (2015)"},{"issue":"4","key":"12_CR26","doi-asserted-by":"publisher","first-page":"130","DOI":"10.46586\/tosc.v2017.i4.130-168","volume":"2017","author":"J Jean","year":"2017","unstructured":"Jean, J., Peyrin, T., Sim, S.M., Tourteaux, J.: Optimizing implementations of lightweight building blocks. IACR Transactions on Symmetric Cryptology 2017(4), 130\u2013168 (2017)","journal-title":"IACR Transactions on Symmetric Cryptology"},{"key":"12_CR27","doi-asserted-by":"crossref","unstructured":"Jiang, J., Sun, X., Teng, S.H., Wu, B., Wu, K., Zhang, J.: Optimal space-depth trade-off of CNOT circuits in quantum logic synthesis. In: Proceedings of the Fourteenth Annual ACM-SIAM Symposium on Discrete Algorithms. pp. 213\u2013229. SIAM (2020)","DOI":"10.1137\/1.9781611975994.13"},{"key":"12_CR28","doi-asserted-by":"crossref","unstructured":"Junod, P., Vaudenay, S.: FOX: a new family of block ciphers. In: Selected Areas in Cryptography: 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers 11. pp. 114\u2013129. Springer (2005)","DOI":"10.1007\/978-3-540-30564-4_8"},{"key":"12_CR29","doi-asserted-by":"crossref","unstructured":"Kaplan, M., Leurent, G., Leverrier, A., Naya-Plasencia, M.: Breaking symmetric cryptosystems using quantum period finding. In: Advances in Cryptology\u2013CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II 36. pp. 207\u2013237. Springer (2016)","DOI":"10.1007\/978-3-662-53008-5_8"},{"key":"12_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TQE.2020.2965697","volume":"1","author":"B Langenberg","year":"2020","unstructured":"Langenberg, B., Pham, H., Steinwandt, R.: Reducing the cost of implementing the advanced encryption standard as a quantum circuit. IEEE Transactions on Quantum Engineering 1, 1\u201312 (2020)","journal-title":"IEEE Transactions on Quantum Engineering"},{"key":"12_CR31","doi-asserted-by":"crossref","unstructured":"Leander, G., May, A.: Grover meets simon\u2013quantumly attacking the FX-construction. In: Advances in Cryptology\u2013ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II 23. pp. 161\u2013178. Springer (2017)","DOI":"10.1007\/978-3-319-70697-9_6"},{"key":"12_CR32","doi-asserted-by":"crossref","unstructured":"Li, S., Sun, S., Li, C., Wei, Z., Hu, L.: Constructing low-latency involutory MDS matrices with lightweight circuits. IACR Transactions on Symmetric Cryptology pp. 84\u2013117 (2019)","DOI":"10.46586\/tosc.v2019.i1.84-117"},{"key":"12_CR33","doi-asserted-by":"crossref","unstructured":"Li, Y., Wang, M.: On the construction of lightweight circulant involutory MDS matrices. In: Fast Software Encryption: 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers. pp. 121\u2013139. Springer (2016)","DOI":"10.1007\/978-3-662-52993-5_7"},{"issue":"9","key":"12_CR34","doi-asserted-by":"publisher","DOI":"10.1007\/s11433-022-1921-y","volume":"65","author":"Z Li","year":"2022","unstructured":"Li, Z., Cai, B., Sun, H., Liu, H., Wan, L., Qin, S., Wen, Q., Gao, F.: Novel quantum circuit implementation of advanced encryption standard with low costs. Science China Physics, Mechanics & Astronomy 65(9), 290311 (2022)","journal-title":"Science China Physics, Mechanics & Astronomy"},{"key":"12_CR35","doi-asserted-by":"publisher","first-page":"1171753","DOI":"10.3389\/fphy.2023.1171753","volume":"11","author":"Z Li","year":"2023","unstructured":"Li, Z., Gao, F., Qin, S., Wen, Q.: New record in the number of qubits for a quantum implementation of AES. Frontiers in Physics 11, 1171753 (2023)","journal-title":"Frontiers in Physics"},{"issue":"9","key":"12_CR36","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1007\/s11128-023-04043-9","volume":"22","author":"D Lin","year":"2023","unstructured":"Lin, D., Xiang, Z., Xu, R., Zhang, S., Zeng, X.: Optimized quantum implementation of aes. Quantum Information Processing 22(9), \u00a0352 (2023)","journal-title":"Quantum Information Processing"},{"key":"12_CR37","doi-asserted-by":"crossref","unstructured":"Liu, M., Sim, S.M.: Lightweight MDS generalized circulant matrices. In: Fast Software Encryption: 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers. pp. 101\u2013120. Springer (2016)","DOI":"10.1007\/978-3-662-52993-5_6"},{"key":"12_CR38","doi-asserted-by":"crossref","unstructured":"Liu, Q., Preneel, B., Zhao, Z., Wang, M.: Improved quantum circuits for AES: Reducing the depth and the number of qubits. In: International Conference on the Theory and Application of Cryptology and Information Security. pp. 67\u201398. Springer (2023)","DOI":"10.1007\/978-981-99-8727-6_3"},{"key":"12_CR39","doi-asserted-by":"crossref","unstructured":"Liu, Q., Wang, W., Fan, Y., Wu, L., Sun, L., Wang, M.: Towards low-latency implementation of linear layers. IACR Transactions on Symmetric Cryptology pp. 158\u2013182 (2022)","DOI":"10.46586\/tosc.v2022.i1.158-182"},{"key":"12_CR40","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press (2000)"},{"issue":"3","key":"12_CR41","first-page":"282","volume":"8","author":"KN Patel","year":"2008","unstructured":"Patel, K.N., Markov, I.L., Hayes, J.P.: Optimal synthesis of linear reversible circuits. Quantum Inf. Comput. 8(3), 282\u2013294 (2008)","journal-title":"Quantum Inf. Comput."},{"key":"12_CR42","doi-asserted-by":"publisher","first-page":"79","DOI":"10.22331\/q-2018-08-06-79","volume":"2","author":"J Preskill","year":"2018","unstructured":"Preskill, J.: Quantum computing in the NISQ era and beyond. Quantum 2, \u00a079 (2018)","journal-title":"Quantum"},{"key":"12_CR43","unstructured":"Q#, M.: Quantum development https:\/\/devblogs.microsoft.com\/qsharp\/"},{"issue":"2","key":"12_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2431211.2431220","volume":"45","author":"M Saeedi","year":"2013","unstructured":"Saeedi, M., Markov, I.L.: Synthesis and optimization of reversible circuits-a survey. ACM Computing Surveys (CSUR) 45(2), 1\u201334 (2013)","journal-title":"ACM Computing Surveys (CSUR)"},{"issue":"1","key":"12_CR45","doi-asserted-by":"publisher","first-page":"95","DOI":"10.46586\/tosc.v2016.i1.95-113","volume":"2016","author":"S Sarkar","year":"2016","unstructured":"Sarkar, S., Syed, H.: Lightweight diffusion layer: Importance of Toeplitz Matrices. IACR Transactions on Symmetric Cryptology 2016(1), 95\u2013113 (2016)","journal-title":"IACR Transactions on Symmetric Cryptology"},{"key":"12_CR46","doi-asserted-by":"crossref","unstructured":"Sarkar, S., Syed, H.: Analysis of Toeplitz MDS Matrices. In: Australasian Conference on Information Security and Privacy. pp. 3\u201318. Springer (2017)","DOI":"10.1007\/978-3-319-59870-3_1"},{"key":"12_CR47","unstructured":"Schaeffer, B., Perkowski, M.: A cost minimization approach to synthesis of linear reversible circuits. arXiv preprint arXiv:1407.0070 (2014)"},{"issue":"1","key":"12_CR48","first-page":"23","volume":"15","author":"B Schneier","year":"1998","unstructured":"Schneier, B., Kelsey, J., Whiting, D., Wagner, D., Hall, C., Ferguson, N.: Twofish: A 128-bit block cipher. NIST AES Proposal 15(1), 23\u201391 (1998)","journal-title":"NIST AES Proposal"},{"issue":"4","key":"12_CR49","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.87.042302","volume":"87","author":"P Selinger","year":"2013","unstructured":"Selinger, P.: Quantum circuits of T-depth one. Physical Review A 87(4), 042302 (2013)","journal-title":"Physical Review A"},{"key":"12_CR50","doi-asserted-by":"crossref","unstructured":"Shende, V.V., Bullock, S.S., Markov, I.L.: Synthesis of quantum logic circuits. In: Proceedings of the 2005 Asia and South Pacific Design Automation Conference. pp. 272\u2013275 (2005)","DOI":"10.1109\/ASPDAC.2005.1466172"},{"issue":"4","key":"12_CR51","doi-asserted-by":"publisher","first-page":"489","DOI":"10.46586\/tosc.v2023.i4.489-510","volume":"2023","author":"H Shi","year":"2023","unstructured":"Shi, H., Feng, X., Xu, S.: A framework with improved heuristics to optimize low-latency implementations of linear layers. IACR Transactions on Symmetric Cryptology 2023(4), 489\u2013510 (2023)","journal-title":"IACR Transactions on Symmetric Cryptology"},{"key":"12_CR52","doi-asserted-by":"crossref","unstructured":"Shirai, T., Shibutani, K., Akishita, T., Moriai, S., Iwata, T.: The 128-bit block cipher CLEFIA. In: Fast Software Encryption: 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers 14. pp. 181\u2013195. Springer (2007)","DOI":"10.1007\/978-3-540-74619-5_12"},{"key":"12_CR53","doi-asserted-by":"crossref","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th annual symposium on foundations of computer science. pp. 124\u2013134. IEEE (1994)","DOI":"10.1109\/SFCS.1994.365700"},{"key":"12_CR54","doi-asserted-by":"crossref","unstructured":"Sim, S.M., Khoo, K., Oggier, F., Peyrin, T.: Lightweight MDS involution matrices. In: Fast Software Encryption: 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers 22. pp. 471\u2013493. Springer (2015)","DOI":"10.1007\/978-3-662-48116-5_23"},{"issue":"5","key":"12_CR55","doi-asserted-by":"publisher","first-page":"1474","DOI":"10.1137\/S0097539796298637","volume":"26","author":"DR Simon","year":"1997","unstructured":"Simon, D.R.: On the power of quantum computation. SIAM journal on computing 26(5), 1474\u20131483 (1997)","journal-title":"SIAM journal on computing"},{"key":"12_CR56","doi-asserted-by":"publisher","first-page":"49","DOI":"10.22331\/q-2018-01-31-49","volume":"2","author":"DS Steiger","year":"2018","unstructured":"Steiger, D.S., H\u00e4ner, T., Troyer, M.: Projectq: an open source software framework for quantum computing. Quantum 2, \u00a049 (2018)","journal-title":"Quantum"},{"key":"12_CR57","doi-asserted-by":"crossref","unstructured":"Sun, X., Tian, G., Yang, S., Yuan, P., Zhang, S.: Asymptotically optimal circuit depth for quantum state preparation and general unitary synthesis. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (2023)","DOI":"10.1109\/TCAD.2023.3244885"},{"key":"12_CR58","unstructured":"Wu, B., He, X., Yang, S., Shou, L., Tian, G., Zhang, J., Sun, X.: Optimization of CNOT circuits under topological constraints. arXiv preprint arXiv:1910.14478 (2019)"},{"key":"12_CR59","doi-asserted-by":"crossref","unstructured":"Xiang, Z., Zeng, X., Lin, D., Bao, Z., Zhang, S.: Optimizing implementations of linear layers. IACR Transactions on Symmetric Cryptology pp. 120\u2013145 (2020)","DOI":"10.46586\/tosc.v2020.i2.120-145"},{"key":"12_CR60","unstructured":"Zhang, A., Feng, X., Xu, S.: Size optimization of CNOT circuits on NISQ. arXiv preprint arXiv:2210.05184 (2022)"},{"key":"12_CR61","doi-asserted-by":"crossref","unstructured":"Zhu, C., Huang, Z.: Optimizing the depth of quantum implementations of linear layers. In: International Conference on Information Security and Cryptology. pp. 129\u2013147. Springer (2022)","DOI":"10.1007\/978-3-031-26553-2_7"},{"issue":"5","key":"12_CR62","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/s11128-022-03518-5","volume":"21","author":"J Zou","year":"2022","unstructured":"Zou, J., Li, L., Wei, Z., Luo, Y., Liu, Q., Wu, W.: New quantum circuit implementations of SM4 and SM3. Quantum Information Processing 21(5), \u00a0181 (2022)","journal-title":"Quantum Information Processing"},{"key":"12_CR63","doi-asserted-by":"crossref","unstructured":"Zou, J., Wei, Z., Sun, S., Liu, X., Wu, W.: Quantum circuit implementations of AES with fewer qubits. In: Advances in Cryptology\u2013ASIACRYPT 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7\u201311, 2020, Proceedings, Part II 26. pp. 697\u2013726. Springer (2020)","DOI":"10.1007\/978-3-030-64834-3_24"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0944-4_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T06:12:38Z","timestamp":1733897558000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0944-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,12]]},"ISBN":["9789819609437","9789819609444"],"references-count":63,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0944-4_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,12]]},"assertion":[{"value":"12 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asiacrypt.iacr.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}