{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,13]],"date-time":"2025-09-13T16:14:56Z","timestamp":1757780096048,"version":"3.37.3"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2016YFB0800601"],"award-info":[{"award-number":["2016YFB0800601"]}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61303217","61502372"],"award-info":[{"award-number":["61303217","61502372"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Guangxi Key Laboratory of Cryptography and Information Security","award":["GCIS201802"],"award-info":[{"award-number":["GCIS201802"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1007\/s11128-021-03275-x","type":"journal-article","created":{"date-parts":[[2021,10,15]],"date-time":"2021-10-15T14:28:36Z","timestamp":1634308116000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Quantum security of Grain-128\/Grain-128a stream cipher against HHL algorithm"],"prefix":"10.1007","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6887-524X","authenticated-orcid":false,"given":"Weijie","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8309-2200","authenticated-orcid":false,"given":"Juntao","family":"Gao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,15]]},"reference":[{"issue":"6","key":"3275_CR1","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1007\/BF02650179","volume":"21","author":"RP Feynman","year":"1982","unstructured":"Feynman, R.P.: Simulating physics with computers. Int. J. Theor. Phys. 21(6), 467\u2013488 (1982)","journal-title":"Int. J. Theor. Phys."},{"key":"3275_CR2","unstructured":"Shor, P.W.: Algorithms for quantum computation: Discrete logarithms and factoring. In: Proceedings 35th annual symposium on foundations of computer science. IEEE , pp. 124\u2013134 (1994)"},{"key":"3275_CR3","doi-asserted-by":"crossref","unstructured":"Grover, L.K.: A fast quantum mechanical algorithm for database search (1996). preprint arXiv:quant-ph\/9605043","DOI":"10.1145\/237814.237866"},{"key":"3275_CR4","doi-asserted-by":"publisher","unstructured":"Raj G., Singh D., Madaan A.: Analysis of classical and quantum computing based on Grover and Shor algorithm. In: Satapathy S., Bhateja V., Das, S. (eds) Smart Computing and Informatics. Smart Innovation, Systems and Technologies, vol. 78. Springer, Singapore (2018). https:\/\/doi.org\/10.1007\/978-981-10-5547-8_43","DOI":"10.1007\/978-981-10-5547-8_43"},{"issue":"1\u20132","key":"3275_CR5","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s00450-006-0008-7","volume":"21","author":"M R\u00f6tteler","year":"2006","unstructured":"R\u00f6tteler, M.: A survey of some recent results. Informatik-Forschung und Entwicklung 21(1\u20132), 3\u201320 (2006)","journal-title":"Informatik-Forschung und Entwicklung"},{"key":"3275_CR6","doi-asserted-by":"publisher","first-page":"15023","DOI":"10.1038\/npjqi.2015.23","volume":"2","author":"A Montanaro","year":"2016","unstructured":"Montanaro, A.: Quantum algorithms: an overview. NPJ Quantum Inf. 2, 15023 (2016)","journal-title":"NPJ Quantum Inf."},{"issue":"7671","key":"3275_CR7","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1038\/nature23474","volume":"549","author":"J Biamonte","year":"2017","unstructured":"Biamonte, J., Wittek, P., Pancotti, N., et al.: Quantum machine learning. Nature 549(7671), 195 (2017)","journal-title":"Nature"},{"key":"3275_CR8","unstructured":"Wiebe, N., Kapoor, A., Svore, K.M.: Quantum deep learning (2014). arXiv preprint arXiv:1412.3489"},{"issue":"5","key":"3275_CR9","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MSP.2018.3761719","volume":"16","author":"SP Jordan","year":"2018","unstructured":"Jordan, S.P., Liu, Y.K.: Quantum cryptanalysis: shor, grover, and beyond. IEEE Secur. Priv. 16(5), 14\u201321 (2018)","journal-title":"IEEE Secur. Priv."},{"key":"3275_CR10","volume-title":"Quantum Algorithms and its Applications in Cryptography","author":"H.W Li","year":"2015","unstructured":"Li, H..W.: Quantum Algorithms and its Applications in Cryptography. Institute of Information Engineering Chinese Academy of Sciences, Beijing (2015)"},{"key":"3275_CR11","doi-asserted-by":"crossref","unstructured":"Alagic, G., Gagliardoni, T., Majenz, C.: Unforgeable quantum encryption. In: Annual international conference on the theory and applications of cryptographic techniques, pp. 489\u2013519. Springer, Cham (2018)","DOI":"10.1007\/978-3-319-78372-7_16"},{"key":"3275_CR12","doi-asserted-by":"crossref","unstructured":"Alagic, G., Russell, A.: Quantum-secure symmetric-key cryptography based on hidden shifts. In: Annual international conference on the theory and applications of cryptographic techniques, pp. 65\u201393. Springer, Cham (2017)","DOI":"10.1007\/978-3-319-56617-7_3"},{"issue":"1","key":"3275_CR13","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/s10623-015-0157-4","volume":"78","author":"A Broadbent","year":"2016","unstructured":"Broadbent, A., Schaffner, C.: Quantum cryptography beyond quantum key distribution. Des. Codes Cryptogr. 78(1), 351\u2013382 (2016)","journal-title":"Des. Codes Cryptogr."},{"key":"3275_CR14","doi-asserted-by":"publisher","first-page":"55","DOI":"10.46586\/tosc.v2019.i2.55-93","volume":"2019","author":"X Bonnetain","year":"2019","unstructured":"Bonnetain, X., Plasencia, M.N., Schrottenloher, A.: Quantum security analysis of AES. IACR Trans. Symmetric Cryptol. 2019, 55\u201393 (2019)","journal-title":"IACR Trans. Symmetric Cryptol."},{"issue":"5","key":"3275_CR15","doi-asserted-by":"publisher","first-page":"1161","DOI":"10.1007\/s10623-018-0510-5","volume":"87","author":"HQ Xie","year":"2019","unstructured":"Xie, H.Q., Yang, L.: Using Bernstein Vazirani algorithm to attack block ciphers. Des. Codes Cryptogr. 87(5), 1161\u20131182 (2019)","journal-title":"Des. Codes Cryptogr."},{"key":"3275_CR16","doi-asserted-by":"crossref","unstructured":"Farik, M., Ali, S.: The need for quantum-resistant cryptography in classical computers. In: 2016 3rd Asia-Pacific World Congress on Computer Science and Engineering (APWC on CSE). IEEE , pp. 98\u2013105 (2016)","DOI":"10.1109\/APWC-on-CSE.2016.027"},{"issue":"15","key":"3275_CR17","doi-asserted-by":"publisher","first-page":"150502","DOI":"10.1103\/PhysRevLett.103.150502","volume":"103","author":"AW Harrow","year":"2009","unstructured":"Harrow, A.W., Hassidim, A., Lloyd, S.: Quantum algorithm for linear systems of equations. Phys. Rev. Lett. 103(15), 150502 (2009)","journal-title":"Phys. Rev. Lett."},{"issue":"13","key":"3275_CR18","doi-asserted-by":"publisher","first-page":"130503","DOI":"10.1103\/PhysRevLett.113.130503","volume":"113","author":"P Rebentrost","year":"2014","unstructured":"Rebentrost, P., Mohseni, M., Lloyd, S.: Quantum support vector machine for big data classification. Phys. Rev. Lett. 113(13), 130503 (2014)","journal-title":"Phys. Rev. Lett."},{"key":"3275_CR19","unstructured":"Chen, Y.A., Gao, X.S., Yuan, C.M.: Quantum algorithm for optimization and polynomial system solving over finite field and application to cryptanalysis (2018). arXiv preprint arXiv:1802.03856"},{"key":"3275_CR20","unstructured":"Chen, Y.A., Gao, X.S.: Quantum algorithms for Boolean equation solving and quantum algebraic attack on cryptosystems (2017). arXiv preprint arXiv:1712.06239"},{"key":"3275_CR21","unstructured":"eSTREAM-ECRYPT steam cipher project. http:\/\/www.ecrypt.eu.org\/stream\/"},{"issue":"1","key":"3275_CR22","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1504\/IJWMC.2007.013798","volume":"2","author":"M Hell","year":"2007","unstructured":"Hell, M., Johansson, T., Meier, W.: Grain: a stream cipher for constrained environments. IJWMC 2(1), 86\u201393 (2007)","journal-title":"IJWMC"},{"key":"3275_CR23","doi-asserted-by":"crossref","unstructured":"Hell, M., Johansson, T., Maximov, A.: A stream cipher proposal: Grain-128. In: 2006 IEEE international symposium on information theory. IEEE , pp. 1614\u20131618 (2006)","DOI":"10.1109\/ISIT.2006.261549"},{"key":"3275_CR24","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1504\/IJWMC.2011.044106","volume":"5","author":"\u00c5 Martin","year":"2011","unstructured":"Martin, \u00c5., et al.: Grain-128a: a new version of Grain-128 with optional authentication. Int. J. Wirel. Mob. Comput. 5, 48\u201359 (2011)","journal-title":"Int. J. Wirel. Mob. Comput."},{"key":"3275_CR25","doi-asserted-by":"crossref","unstructured":"Lee, Y., Jeong, K., et al.: Related-key chosen IV attacks on Grain-v1 and Grain-128. In: Australasian conference on information security and privacy, pp. 321\u2013335. Springer, Berlin, Heidelberg (2008)","DOI":"10.1007\/978-3-540-70500-0_24"},{"key":"3275_CR26","doi-asserted-by":"crossref","unstructured":"Dinur, I., Guneysu, T., Paar, C., Shamir, A., Zimmermann, R.: An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware. In: International conference on the theory and application of cryptology and information security. Springer, Berlin, Heidelberg, pp. 327\u2013343 (2011)","DOI":"10.1007\/978-3-642-25385-0_18"},{"key":"3275_CR27","doi-asserted-by":"crossref","unstructured":"Dinur, I., Shamir, A.: Breaking Grain-128 with dynamic cube attacks. In: International workshop on fast software encryption. Springer, Berlin, Heidelberg, pp. 167\u2013187 (2011)","DOI":"10.1007\/978-3-642-21702-9_10"},{"key":"3275_CR28","doi-asserted-by":"crossref","unstructured":"Banik, S., Maitra, S., Sarkar, S., Meltem, S\u00f6nmez. T.: A chosen IV related key attack on Grain-128a. (eds) Information Security and Privacy. ACISP, Lecture Notes in Computer Science, vol. 7959. Springer, Berlin, Heidelberg (2013)","DOI":"10.1007\/978-3-642-39059-3_2"},{"key":"3275_CR29","first-page":"412","volume":"2017","author":"XM Fu","year":"2017","unstructured":"Fu, X.M., Wang, X.Y., et al.: Determining the nonexistent terms of non-linear multivariate polynomials: how to break Grain-128 more efficiently. IACR Cryptol. ePrint Arch. 2017, 412 (2017)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"3275_CR30","unstructured":"Ambainis, A.: Variable time amplitude amplification and a faster quantum algorithm for solving systems of linear equations (2010). arXiv preprint arXiv:1010.4458"},{"key":"3275_CR31","unstructured":"Caminata, A., Gorla, E.: Solving multivariate polynomial systems and an invariant from commutative algebra (2017). arXiv preprint arXiv:1706.06319"},{"issue":"1\u20133","key":"3275_CR32","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/S0022-4049(99)00005-5","volume":"139","author":"JC Faugere","year":"1999","unstructured":"Faugere, J.C.: A new efficient algorithm for computing Gr\u00f6bner bases (F4)[J]. J. Pure Appl. Algebra 139(1\u20133), 61\u201388 (1999)","journal-title":"J. Pure Appl. Algebra"},{"key":"3275_CR33","doi-asserted-by":"crossref","unstructured":"Courtois, N., Klimov, A., Patarin, J., Shamir, A.: Efficient algorithms for solving overdefined systems of multivariate polynomial equations. In: International conference on the theory and applications of cryptographic techniques. Springer, Berlin, Heidelberg, pp. 392\u2013407 (2000)","DOI":"10.1007\/3-540-45539-6_27"},{"key":"3275_CR34","unstructured":"Tang, Y.L., Han, D., Li, Z.C.: Key recover attack on stream Cipher Grain-128 and its improvement. Comput. Appl. Softw. 33(5), 298\u2013301 (2016)"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03275-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-021-03275-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03275-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,30]],"date-time":"2021-10-30T08:33:22Z","timestamp":1635582802000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-021-03275-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10]]},"references-count":34,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2021,10]]}},"alternative-id":["3275"],"URL":"https:\/\/doi.org\/10.1007\/s11128-021-03275-x","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"type":"print","value":"1570-0755"},{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2021,10]]},"assertion":[{"value":"29 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 September 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 October 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"343"}}