Abstract
This chapter consists of the algorithmic description of the target ciphers which are implemented/analyzed in this book.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
We indicate the SBoxes by the shorthand string-based notation, as opposed to the more common table-based notation, to save space.
- 2.
- 3.
It may be noted that, \(c = b - r\) is the capacity.
- 4.
Apart from LOWMC, Picnic also uses SHA-3 in some form.
- 5.
As the exact specification is generated at random, it is suggested in [16] to call LOWMC as a ‘meta-cipher’ (instead of a ‘cipher’).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Baksi, A., Jang, K. (2024). Concise Cipher Description. In: Implementation and Analysis of Ciphers in Quantum Computing. Computer Architecture and Design Methodologies. Springer, Singapore. https://doi.org/10.1007/978-981-97-0025-7_9
Download citation
DOI: https://doi.org/10.1007/978-981-97-0025-7_9
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-97-0024-0
Online ISBN: 978-981-97-0025-7
eBook Packages: EngineeringEngineering (R0)