Analysis of the amplitude form of the quantum hash function
In this article, the properties of quantum hash functions are further explored. Previous findings show that so-called small-bias sets (special subsets of the set of elements of a cyclic group) generate a “phase” quantum hash function. Here, it was proved that they also generate an “amplitude” quantu...
| Published in: | Учёные записки Казанского университета: Серия Физико-математические науки |
|---|---|
| Main Authors: | M. F. Ablayev, F. M. Ablayev, A. V. Vasiliev |
| Format: | Article |
| Language: | English |
| Published: |
Kazan Federal University
2023-11-01
|
| Subjects: | |
| Online Access: | https://uzakufismat.elpub.ru/jour/article/view/3 |
Similar Items
On quantum collision resistant function
by: M.F. Ablayev
Published: (2021-03-01)
by: M.F. Ablayev
Published: (2021-03-01)
Theory and Applications of Quantum Hashing
by: Farid Ablayev, et al.
Published: (2025-05-01)
by: Farid Ablayev, et al.
Published: (2025-05-01)
Universal hash functions from quantum procedures
by: F.M. Ablayev, et al.
Published: (2020-09-01)
by: F.M. Ablayev, et al.
Published: (2020-09-01)
Quantum Amplitude Hash Function for Quantum Evidence Integrity
by: Donggun Lee, et al.
Published: (2025-01-01)
by: Donggun Lee, et al.
Published: (2025-01-01)
Hybrid Classical–Quantum Text Search Based on Hashing
by: Farid Ablayev, et al.
Published: (2024-06-01)
by: Farid Ablayev, et al.
Published: (2024-06-01)
Developing a New Collision-Resistant Hashing Algorithm
by: Larissa V. Cherckesova, et al.
Published: (2022-08-01)
by: Larissa V. Cherckesova, et al.
Published: (2022-08-01)
Beyond Classical Cryptography: A Systematic Review of Post-Quantum Hash-Based Signature Schemes, Security, and Optimizations
by: Efat Fathalla, et al.
Published: (2024-01-01)
by: Efat Fathalla, et al.
Published: (2024-01-01)
Comprehensive Analysis and Implementation of Isogeny-Based Hash Functions
by: Donghoe Heo, et al.
Published: (2024-01-01)
by: Donghoe Heo, et al.
Published: (2024-01-01)
Efficient Implementation of Lightweight Hash Functions on GPU and Quantum Computers for IoT Applications
by: Wai-Kong Lee, et al.
Published: (2022-01-01)
by: Wai-Kong Lee, et al.
Published: (2022-01-01)
Quantum rebound attacks on reduced-round ARIA-based hash functions
by: Seungjun Baek, et al.
Published: (2023-06-01)
by: Seungjun Baek, et al.
Published: (2023-06-01)
Differential Analysis of a Cryptographic Hashing Algorithm HBC-256
by: Kunbolat Algazy, et al.
Published: (2022-10-01)
by: Kunbolat Algazy, et al.
Published: (2022-10-01)
Post-Quantum enhanced Ascon for secure vehicular IoT data integrity
by: Bhuvaneshwari A. J, et al.
Published: (2025-07-01)
by: Bhuvaneshwari A. J, et al.
Published: (2025-07-01)
Quantum walks-based simple authenticated quantum cryptography protocols for secure wireless sensor networks
by: Ahmad Alanezi, et al.
Published: (2023-01-01)
by: Ahmad Alanezi, et al.
Published: (2023-01-01)
A Parallel Quantum Circuit Implementations of LSH Hash Function for Use with Grover’s Algorithm
by: Gyeongju Song, et al.
Published: (2022-10-01)
by: Gyeongju Song, et al.
Published: (2022-10-01)
On Quantum Methods for Machine Learning Problems Part I: Quantum Tools
by: Farid Ablayev, et al.
Published: (2020-03-01)
by: Farid Ablayev, et al.
Published: (2020-03-01)
Generic Quantum Blockchain-Envisioned Security Framework for IoT Environment: Architecture, Security Benefits and Future Research
by: Mohammad Wazid, et al.
Published: (2024-01-01)
by: Mohammad Wazid, et al.
Published: (2024-01-01)
Quantum Random Oracle Model for Quantum Public-Key Encryption
by: Tao Shang, et al.
Published: (2019-01-01)
by: Tao Shang, et al.
Published: (2019-01-01)
Hyperledger Fabric-Based Post Quantum Cryptography for Healthcare Application Using Discrete Event Simulation
by: Tamara Zhukabayeva, et al.
Published: (2024-01-01)
by: Tamara Zhukabayeva, et al.
Published: (2024-01-01)
New indifferentiability security proof of MDPH hash function
by: Chun Guo, et al.
Published: (2022-07-01)
by: Chun Guo, et al.
Published: (2022-07-01)
Syrga2: Post-Quantum Hash-Based Signature Scheme
by: Kunbolat Algazy, et al.
Published: (2024-06-01)
by: Kunbolat Algazy, et al.
Published: (2024-06-01)
A Hash-Based Quantum-Resistant Chameleon Signature Scheme
by: P. Thanalakshmi, et al.
Published: (2021-12-01)
by: P. Thanalakshmi, et al.
Published: (2021-12-01)
Generate Random Image-Key using Hash Technique
by: Nidaa F. Hassan, et al.
Published: (2010-01-01)
by: Nidaa F. Hassan, et al.
Published: (2010-01-01)
Analysis of Atom against quantum attacks
by: Ravi Anand, et al.
Published: (2024-03-01)
by: Ravi Anand, et al.
Published: (2024-03-01)
Development of a New Post-Quantum Digital Signature Algorithm: Syrga-1
by: Kunbolat Algazy, et al.
Published: (2024-01-01)
by: Kunbolat Algazy, et al.
Published: (2024-01-01)
Quantum vs post‐quantum security for future networks: Survey
by: Savo Glisic
Published: (2024-01-01)
by: Savo Glisic
Published: (2024-01-01)
An Ordered Universal Accumulator Based on a Hash Chain
by: Wenbao Jiang, et al.
Published: (2025-02-01)
by: Wenbao Jiang, et al.
Published: (2025-02-01)
Enhancing satellite‐to‐ground communication using quantum key distribution
by: Keshav Kasliwal, et al.
Published: (2023-06-01)
by: Keshav Kasliwal, et al.
Published: (2023-06-01)
A Stable Hash Function Based on Parity-Dependent Quantum Walks With Memory (August 2023)
by: Qing Zhou, et al.
Published: (2024-01-01)
by: Qing Zhou, et al.
Published: (2024-01-01)
The Untapped Potential of Ascon Hash Functions: Benchmarking, Hardware Profiling, and Application Insights for Secure IoT and Blockchain Systems
by: Meera Gladis Kurian, et al.
Published: (2025-09-01)
by: Meera Gladis Kurian, et al.
Published: (2025-09-01)
Quantum BER estimation modelling and analysis for satellite‐based quantum key distribution scenarios
by: Abhishek Khanna, et al.
Published: (2024-06-01)
by: Abhishek Khanna, et al.
Published: (2024-06-01)
A Hash-Based Quantum-Resistant Designated Verifier Signature Scheme
by: P. Thanalakshmi, et al.
Published: (2022-05-01)
by: P. Thanalakshmi, et al.
Published: (2022-05-01)
Chosen-Prefix Collisions on AES-like Hashing
by: Shiyao Chen, et al.
Published: (2024-12-01)
by: Shiyao Chen, et al.
Published: (2024-12-01)
On Quantum Methods for Machine Learning Problems Part II: Quantum Classification Algorithms
by: Farid Ablayev, et al.
Published: (2020-03-01)
by: Farid Ablayev, et al.
Published: (2020-03-01)
Integrated semi‐quantum layered communication
by: Rajni Bala, et al.
Published: (2024-03-01)
by: Rajni Bala, et al.
Published: (2024-03-01)
Building Modern GPU Brute-Force Collision Resistible Hash Algorithm
by: L. A. Nadeinsky
Published: (2012-03-01)
by: L. A. Nadeinsky
Published: (2012-03-01)
Quantum Obfuscation of Generalized Quantum Power Functions with Coefficient
by: Yazhuo Jiang, et al.
Published: (2023-11-01)
by: Yazhuo Jiang, et al.
Published: (2023-11-01)
The quantum internet: A synergy of quantum information technologies and 6G networks
by: Georgi Gary Rozenman, et al.
Published: (2023-12-01)
by: Georgi Gary Rozenman, et al.
Published: (2023-12-01)
A Hybrid Key Generator Model Based on Multiscale Prime Sieve and Quantum-Inspired Approaches
by: Gerardo Iovane, et al.
Published: (2025-07-01)
by: Gerardo Iovane, et al.
Published: (2025-07-01)
On hashing into elliptic curves
by: Farashahi Reza R., et al.
Published: (2009-12-01)
by: Farashahi Reza R., et al.
Published: (2009-12-01)
The Road From Classical to Quantum Codes: A Hashing Bound Approaching Design Procedure
by: Zunaira Babar, et al.
Published: (2015-01-01)
by: Zunaira Babar, et al.
Published: (2015-01-01)
Similar Items
-
On quantum collision resistant function
by: M.F. Ablayev
Published: (2021-03-01) -
Theory and Applications of Quantum Hashing
by: Farid Ablayev, et al.
Published: (2025-05-01) -
Universal hash functions from quantum procedures
by: F.M. Ablayev, et al.
Published: (2020-09-01) -
Quantum Amplitude Hash Function for Quantum Evidence Integrity
by: Donggun Lee, et al.
Published: (2025-01-01) -
Hybrid Classical–Quantum Text Search Based on Hashing
by: Farid Ablayev, et al.
Published: (2024-06-01)
