Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
19
views
39
references
Top references
cited by
3
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,365
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Knowledge-Based Intelligent Information and Engineering Systems
Hidden Shift Quantum Cryptanalysis and Implications
other
Author(s):
Xavier Bonnetain
,
María Naya-Plasencia
Publication date
(Online):
October 27 2018
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
cGMP: Generators, Effectors and Therapeutic Implications Conference
Most cited references
39
Record
: found
Abstract
: not found
Article
: not found
Hacking commercial quantum cryptography systems by tailored bright illumination
Lars Lydersen
,
Carlos Wiechers
,
Christoffer Wittmann
…
(2010)
0
comments
Cited
211
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book
: not found
The Design of Rijndael
Joan Daemen
,
Vincent Rijmen
(2002)
0
comments
Cited
195
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems
Yi. Zhao
,
Chi-Hang Fung
,
Bing Qi
…
(2008)
0
comments
Cited
115
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2018
Publication date (Online):
October 27 2018
Pages
: 560-592
DOI:
10.1007/978-3-030-03326-2_19
SO-VID:
c6f2eed1-8787-4966-ad65-8cfd927400db
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Just a Little Bit More
pp. 3
Shape and Content
pp. 16
Provenance of Dynamic Adaptations in User-Steered Dataflows
pp. 26
Structural Methods to Improve the Symbolic Analysis of Petri Nets
pp. 122
Tutorial on Parameterized Model Checking of Fault-Tolerant Distributed Algorithms
pp. 62
Maternal and Neonatal Healthcare Information System: Development of an Obstetric Electronic Health Record and Healthcare Indicators Dashboard
pp. 71
DRAT Proofs, Propagation Redundancy, and Extended Resolution
pp. 64
Reinforcement Learning in Discrete Neural Control of the Underactuated System
pp. 64
Heterogeneous Systems for Energy Efficient Scientific Computing
pp. 98
Concurrent System Programming with Effect Handlers
pp. 115
Model-Based Testing of Thin-Client Web Applications
pp. 121
Building an i2b2-Based Integrated Data Repository for Cancer Research: A Case Study of Ovarian Cancer Registry
pp. 82
The Choice between Verbal Anaphors in Discourse
pp. 131
Heuristic Evaluation of COVID-19 Chatbots
pp. 163
Applicability of the ECM Performance Model to Explicit ODE Methods on Current Multi-core Processors
pp. 94
Implementation of Electronic Health Monitoring Systems at the Community Level in Hong Kong
pp. 122
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
pp. 142
Bus Arrival Time Prediction Using a Modified Amalgamation of Fuzzy Clustering and Neural Network on Spatio-Temporal Data
pp. 197
Weakening the Isolation Assumption of Tamper-Proof Hardware Tokens
pp. 123
Automatic Generation of Trivia Questions
pp. 126
The Complexity of Black-Box Ring Problems
pp. 175
Efficiently Learning the Metric with Side-Information
pp. 185
Graph Parameters and Ramsey Theory
pp. 212
A Scalable Algorithm for Radiative Heat Transfer Using Reverse Monte Carlo Ray Tracing
pp. 248
Formalizing Frankl’s Conjecture: FC-Families
pp. 219
A Survey on Vision-Based Hand Gesture Recognition
pp. 239
Factors Influencing Acceptance and Continued Use of mHealth Apps
pp. 560
Hidden Shift Quantum Cryptanalysis and Implications
pp. 214
A Comparison of Machine Learning Algorithms for Detecting XSS Attacks
pp. 192
Debt Detection in Social Security by Adaptive Sequence Classification
pp. 250
An Artificial Immune System Based Visual Analysis Model and Its Real-Time Terrain Surveillance Application
pp. 206
The Effect of Object Features on Multiple Object Tracking and Identification
pp. 255
Optimizing CNN-Based Object Detection Algorithms on Embedded FPGA Platforms
pp. 278
A Simple Hyper-Geometric Approach for Discovering Putative Transcription Factor Binding Sites
pp. 200
Virtual Cardiac Surgical Planning Through Hemodynamics Simulation and Design Optimization of Fontan Grafts
pp. 204
Attentive User Interface for Interaction within Virtual Reality Environments Based on Gaze Analysis
pp. 266
Efficient Phenotype Evaluation in Cartesian Genetic Programming
pp. 206
Automatic Nonlinear Filtering and Segmentation for Breast Ultrasound Images
pp. 236
Event Modelling and Reasoning with Uncertain Information for Distributed Sensor Networks
pp. 291
Human Resource Allocation in Agile Software Projects Based on Task Similarities
pp. 285
Text Simplification and User Experience
pp. 292
Improving Bayesian Networks Breast Mass Diagnosis by Using Clinical Data
pp. 458
Learning Strategic Group Formation for Coordinated Behavior in Adversarial Multi-Agent with Double DQN
pp. 360
Validating the Requirements and Design of a Hemodialysis Machine Using iUML-B, BMotion Studio, and Co-Simulation
pp. 432
Fun with Bitcoin Smart Contracts
pp. 327
A Memetic Algorithm for Community Detection in Complex Networks
pp. 210
GistSumm: A Summarization Tool Based on a New Extractive Method
pp. 277
Using Multivariate Sequential Patterns to Improve Survival Prediction in Intensive Care Burn Unit
pp. 303
DaFEx: Database of Facial Expressions
pp. 328
A Modified Multi-Objective Optimization Based on Brain Storm Optimization Algorithm
pp. 546
Towards a Conceptual Framework for the Objective Evaluation of User Experience
pp. 419
Affective Haptics for Enhancing Access to Social Interactions for Individuals Who are Blind
pp. 464
Robust Low-Rank Recovery with a Distance-Measure Structure for Face Recognition
pp. 672
A Multimodal Biometric User Identification System Based on Keystroke Dynamics and Mouse Movements
pp. 458
A Scheme for Attentional Video Compression
pp. 737
A Sequence Classification Model Based on Pattern Coverage Rate
pp. 687
Minimum Cost Path Algorithm for Coronary Artery Central Axis Tracking in CT Images
pp. 654
Building Hyper-heuristics Through Ant Colony Optimization for the 2D Bin Packing Problem
pp. 875
Graph Transformations for Modeling hp-Adaptive Finite Element Method with Mixed Triangular and Rectangular Elements
Similar content
3,365
Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy homomorphism scheme
Authors:
Jung Cheon
,
Woo-Hwan Kim
,
Hyun Soo Nam
Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags
Authors:
Aakanksha Tewari
,
B. Gupta
Rotational-XOR Rectangle Cryptanalysis on Round-Reduced Simon
Authors:
Bonwook Koo
,
Younghoon Jung
,
Woo-Hwan Kim
See all similar
Cited by
3
Quantum Security Analysis of CSIDH
Authors:
Xavier Bonnetain
,
André Schrottenloher
Quantum algorithms for attacking hardness assumptions in classical and post‐quantum cryptography
Authors:
J.‐F. Biasse
,
X. Bonnetain
,
E. Kirshanova
…
Continuous hidden shift problem on \(\mathbb{R}^n\)
Authors:
Eunok Bae
,
Soojoon Lee
See all cited by