This book deals with the upcoming threat that may be posed by quantum computers on modern-day security standards, particularly those involving symmetric key ciphers.
Introduction: Emergence of Quantum Computing.- Quantum Computing Fundamental and Cryptographic Perspective.- Reversible S-box Implementation with LIGHTER-R.- Quantum Implementation and Resource Estimate for RECTANGLE and KNOT.- Quantum Implementation and Analysis of DEFAULT.- Quantum Analysis of AES.- Improved Quantum Analysis of SPECK and LOWMC.- Optimized Quantum Implementation and Analysis of CHAM.- Concise Cipher DescriptionConclusion and Outlook.