{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:17:51Z","timestamp":1775913471715,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672290"],"award-info":[{"award-number":["61672290"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802002"],"award-info":[{"award-number":["61802002"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20171458"],"award-info":[{"award-number":["BK20171458"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012154","name":"Graduate Research and Innovation Projects of Jiangsu Province","doi-asserted-by":"publisher","award":["KYCX20_0978"],"award-info":[{"award-number":["KYCX20_0978"]}],"id":[{"id":"10.13039\/501100012154","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Foundation of the Jiangsu Higher Education Institutions","award":["19KJB520028"],"award-info":[{"award-number":["19KJB520028"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11128-021-03036-w","type":"journal-article","created":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T10:05:13Z","timestamp":1617271513000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Quantum forgery attacks on COPA, AES-COPA and marble authenticated encryption algorithms"],"prefix":"10.1007","volume":"20","author":[{"given":"Yinsong","family":"Xu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9317-2869","authenticated-orcid":false,"given":"Wenjie","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Wenbin","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,1]]},"reference":[{"key":"3036_CR1","doi-asserted-by":"crossref","unstructured":"Lu, J.: On the security of the LAC authenticated encryption algorithm. In: Proceedings of Australasian Conference on Information Security and Privacy, ACISP 2016, pp. 395\u2013408 (2016)","DOI":"10.1007\/978-3-319-40367-0_25"},{"key":"3036_CR2","unstructured":"CAESAR-Competition for Authenticated Encryption: Security, applicability, and robustness. http:\/\/competitions.cr.yp.to\/caesar.html"},{"key":"3036_CR3","first-page":"409","volume":"22","author":"GJ Boer","year":"1979","unstructured":"Boer, G.J., McFarlane, N.A.: The AES atmospheric general circulation model. GARP Publ. Ser. 22, 409\u2013460 (1979)","journal-title":"GARP Publ. Ser."},{"key":"3036_CR4","first-page":"424","volume":"2013","author":"E Andreeva","year":"2013","unstructured":"Andreeva, E., Bogdanov, A., Luykx, A., Mennink, B., Tischhauser, E., Yasuda, K.: Parallelizable and authenticated online ciphers. Proc. Adv. Cryptol. ASIACRYPT 2013, 424\u2013443 (2013)","journal-title":"Proc. Adv. Cryptol. ASIACRYPT"},{"key":"3036_CR5","unstructured":"National Institute of Standards and Technology (NIST): Advanced Encryption Standard (AES), FIPS-197 (2001)"},{"key":"3036_CR6","unstructured":"Andreeva, E., Bogdanov, A., Luykx, A., Mennink, B., Tischhauser, E., Yasuda, K.: AES-COPA v1. Submission to the CAESAR competition (2014). http:\/\/competitions.cr.yp.to\/round1\/aescopav1.pdf"},{"key":"3036_CR7","unstructured":"Andreeva, E., Bogdanov, A., Luykx, A., Mennink, B., Tischhauser, E., Yasuda, K.: AES-COPA v2. Submission to the CAESAR competition (2015). http:\/\/competitions.cr.yp.to\/round1\/aescopav2.pdf"},{"key":"3036_CR8","unstructured":"Guo, J.: Marble Specification Version 1.0. Submission to the CAESAR competition, 15 March (2014). http:\/\/competitions.cr.yp.to\/round1\/marblev10.pdf"},{"key":"3036_CR9","unstructured":"Guo, J.: Marble Specification Version 1.1. Submission to the CAESAR Competition, 26 March (2014). http:\/\/competitions.cr.yp.to\/round1\/marblev11.pdf"},{"key":"3036_CR10","unstructured":"Guo, J.: Marble Specification Version 1.2. Submission to the CAESAR Competition, 16 January (2015). https:\/\/groups.google.com\/forum\/#!topic\/crypto-competitions\/FoJITsVbBdM"},{"key":"3036_CR11","unstructured":"Nandi, M.: Revisiting security claims of XLS and COPA. In: IACR Cryptology ePrint Archive, vol. 444 (2015)"},{"key":"3036_CR12","doi-asserted-by":"crossref","unstructured":"Lu, J.: Almost universal forgery attacks on the COPA and marble authenticated encryption algorithms. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 789\u2013799 (2017)","DOI":"10.1145\/3052973.3052981"},{"issue":"3","key":"3036_CR13","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/s10623-014-9969-x","volume":"76","author":"O Dunkelman","year":"2015","unstructured":"Dunkelman, O., Keller, N., Shamir, A.: Almost universal forgery attacks on AES-based MAC\u2019s. Des. Codes Crypt. 76(3), 431\u2013449 (2015)","journal-title":"Des. Codes Crypt."},{"key":"3036_CR14","first-page":"510","volume":"2015","author":"T Fuhr","year":"2015","unstructured":"Fuhr, T., Leurent, G., Suder, V.: Collision attacks against CAESAR candidates. Proc. Adv. Cryptol. ASIACRYPT 2015, 510\u2013532 (2015)","journal-title":"Proc. Adv. Cryptol. ASIACRYPT"},{"key":"3036_CR15","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings of 35th Annual Symposium on Foundations of Computer Science, pp. 124\u2013134 (1997)"},{"key":"3036_CR16","doi-asserted-by":"crossref","unstructured":"Kuwakado, H., Morii, M.: Quantum distinguisher between the 3-round Feistel cipher and the random permutation. In: Proceedings of the 2010 IEEE International Symposium on Information Theory, pp. 13\u201318 (2010)","DOI":"10.1109\/ISIT.2010.5513654"},{"key":"3036_CR17","unstructured":"Kuwakado, H., Morii, M.: Security on the quantum-type even-mansour cipher. In: Proceedings of the 2012 International Symposium on Information Theory and its Applications, pp. 28\u201331 (2012)"},{"issue":"10","key":"3036_CR18","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1007\/s11128-018-2048-x","volume":"17","author":"W-J Liu","year":"2018","unstructured":"Liu, W.-J., Gao, P.-P., Yu, W.-B., Qu, Z.-G., Yang, C.-N.: Quantum relief algorithm. Quantum Inf. Process. 17(10), 280 (2018)","journal-title":"Quantum Inf. Process."},{"key":"3036_CR19","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1038\/nature23474","volume":"549","author":"J Biamonte","year":"2017","unstructured":"Biamonte, J., Wittek, P., Pancotti, N., Rebentrost, P., Wiebe, N., Lloyd, S.: Quantum machine learning. Nature 549, 195\u2013202 (2017)","journal-title":"Nature"},{"key":"3036_CR20","first-page":"8216874","volume":"2020","author":"W Liu","year":"2020","unstructured":"Liu, W., Chen, J., Wang, Y., Gao, P., Lei, Z.: Quantum-based feature selection for multiclassification problem in complex systems with edge computing. Complexity 2020, 8216874 (2020)","journal-title":"Complexity"},{"key":"3036_CR21","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1007\/s11128-020-02915-y","volume":"19","author":"Y-L Gao","year":"2020","unstructured":"Gao, Y.-L., Chen, X.-B., Xu, G., Yuan, K.-G., Liu, W., Yang, Y.-X.: A novel quantum blockchain scheme base on quantum entanglement and DPoS. Quantum Inf. Process. 19, 420 (2020)","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"3036_CR22","doi-asserted-by":"publisher","first-page":"013322","DOI":"10.1103\/PhysRevResearch.2.013322","volume":"2","author":"S Banerjee","year":"2020","unstructured":"Banerjee, S., Mukherjee, A., Panigrahi, P.K.: Quantum blockchain using weighted hypergraph states. Phys. Rev. Res. 2(1), 013322 (2020)","journal-title":"Phys. Rev. Res."},{"issue":"5","key":"3036_CR23","doi-asserted-by":"publisher","first-page":"1474","DOI":"10.1137\/S0097539796298637","volume":"26","author":"DR Simon","year":"1997","unstructured":"Simon, D.R.: On the power of quantum computation. SIAM J. Comput. 26(5), 1474\u20131483 (1997)","journal-title":"SIAM J. Comput."},{"key":"3036_CR24","doi-asserted-by":"crossref","unstructured":"Kaplan, M., Leurent, G., Leverrier, A., Naya-Plasencia, M.: Breaking symmetric cryptosystems using quantum period finding. In: Proceedings of the Advances in Cryptology-CRYPTO 2016, pp. 207\u2013237 (2016)","DOI":"10.1007\/978-3-662-53008-5_8"},{"issue":"2","key":"3036_CR25","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/CC.2018.8300271","volume":"15","author":"T Shi","year":"2018","unstructured":"Shi, T., Jin, C., Guan, J.: Collision attacks against AEZ-PRF for authenticated encryption AEZ. China Commun. 15(2), 46\u201353 (2018)","journal-title":"China Commun."},{"issue":"23","key":"3036_CR26","doi-asserted-by":"publisher","first-page":"4709","DOI":"10.1103\/PhysRevLett.79.4709","volume":"79","author":"LK Grover","year":"1997","unstructured":"Grover, L.K.: Quantum computers can search arbitrarily large databases by a single query. Phys. Rev. Lett. 79(23), 4709\u20134712 (1997)","journal-title":"Phys. Rev. Lett."},{"key":"3036_CR27","doi-asserted-by":"crossref","unstructured":"Leander, G. May, A.: Grover meets Simon\u2014quantumly attacking the FX-construction. In: Proceedings of Advances in Cryptology-ASIACRYPT 2017, pp. 161\u2013178 (2017)","DOI":"10.1007\/978-3-319-70697-9_6"},{"issue":"5","key":"3036_CR28","doi-asserted-by":"publisher","first-page":"1411","DOI":"10.1137\/S0097539796300921","volume":"26","author":"E Bernstein","year":"1997","unstructured":"Bernstein, E., Vazirani, U.: Quantum complexity theory. SIAM J. Comput. 26(5), 1411\u20131473 (1997)","journal-title":"SIAM J. Comput."},{"issue":"5","key":"3036_CR29","doi-asserted-by":"publisher","first-page":"1161","DOI":"10.1007\/s10623-018-0510-5","volume":"87","author":"H Xie","year":"2019","unstructured":"Xie, H., Yang, L.: Using Bernstein-Vazirani algorithm to attack block ciphers. Des. Codes Crypt. 87(5), 1161\u20131182 (2019)","journal-title":"Des. Codes Crypt."},{"key":"3036_CR30","first-page":"211","volume":"2017","author":"A Chailloux","year":"2017","unstructured":"Chailloux, A., Naya-Plasencia, M., Schrottenloher, A.: An efficient quantum collision search algorithm and implications on symmetric cryptography. Proc. Adv. Cryptol. ASIACRYPT 2017, 211\u2013240 (2017)","journal-title":"Proc. Adv. Cryptol. ASIACRYPT"},{"key":"3036_CR31","first-page":"179","volume":"2017","author":"A Hosoyamada","year":"2017","unstructured":"Hosoyamada, A., Sasaki, Y., Xagawa, K.: Quantum multicollision-finding algorithm. Proc. Adv. Cryptol. ASIACRYPT 2017, 179\u2013210 (2017)","journal-title":"Proc. Adv. Cryptol. ASIACRYPT"},{"key":"3036_CR32","first-page":"350","volume":"2019","author":"A Hosoyamada","year":"2019","unstructured":"Hosoyamada, A., Sasaki, Y., Tani, S., Xagawa, K.: Improved quantum multicollision-finding algorithm. Proc. Postquantum Cryptogr. 2019, 350\u2013367 (2019)","journal-title":"Proc. Postquantum Cryptogr."},{"key":"3036_CR33","first-page":"492","volume":"2019","author":"X Bonnetain","year":"2019","unstructured":"Bonnetain, X., Naya-Plasencia, M., Schrottenloher, A.: On quantum slide attacks. Proc. Sel. Areas Cryptogr. SAC 2019, 492\u2013519 (2019)","journal-title":"Proc. Sel. Areas Cryptogr. SAC"},{"key":"3036_CR34","doi-asserted-by":"crossref","unstructured":"Hosoyamada, A., Sasaki, Y.: Quantum Demiric-Selcuk meet-in-the-middle attacks: applications to 6-round generic feistel constructions. In: Proceedings of Security and Cryptography for Networks, pp. 386\u2013403 (2018)","DOI":"10.1007\/978-3-319-98113-0_21"},{"key":"3036_CR35","doi-asserted-by":"crossref","unstructured":"Kaplan, M., Leurent, G., Leverrier, A., Naya-Plasencia, M.: Quantum Differential and Linear Cryptanalysis. arXiv:1510.05836 (2015)","DOI":"10.46586\/tosc.v2016.i1.71-94"},{"issue":"11","key":"3036_CR36","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1007\/s11128-019-2444-x","volume":"18","author":"TR Shi","year":"2019","unstructured":"Shi, T.R., Jin, C.H., Hu, B., Guan, J., Cui, J.Y., Wang, S.P.: Complete analysis of Simon\u2019s quantum algorithm with additional collisions. Quantum Inf. Process. 18(11), 334 (2019)","journal-title":"Quantum Inf. Process."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03036-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-021-03036-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03036-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,5]],"date-time":"2021-05-05T20:20:42Z","timestamp":1620246042000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-021-03036-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4]]},"references-count":36,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["3036"],"URL":"https:\/\/doi.org\/10.1007\/s11128-021-03036-w","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4]]},"assertion":[{"value":"19 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 February 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 April 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"131"}}