Attacks on full block cipher GOST 28147-89 with 2 or 4 related keys | Applied Discrete Mathematics. Supplement. 2010. № 3.

Attacks on full block cipher GOST 28147-89 with 2 or 4 related keys

Download file
Counter downloads: 231

Keywords

Authors

NameOrganizationE-mail
Pudovkina M. AMoscow Engineering Physics Institutemaricap@yandex.ru
Khoruzhenko G. I.Moscow Engineering Physics Institutejorge-x@bk.ru
Всего: 2

References

SekiH., Kaneko T. Differential cryptanalysis of reduced rounds of gost / / Selected Areas in Cryptography. Springer, 2000. No. 2012. P. 315-323.
Biham E., Dunkelman O., Keller N. Improved slide attacks / / LNCS. 2007. No. 4593. P. 153-166.
Kara O. Reflection Cryptanalysis of Some Ciphers / / Ibid. 2008. No. 5365. P. 294-307.
Ko Y., Hong S., Lee W., et al. Related key differential attacks on 27 rounds of xtea and fullround gost / / Ibid. 2004. No. 3017. P. 299-316.
Fleischmann E., Gorski M., Huhne J.-H., Lucks S. Key Recovery Attack on full GOST Block Cipher with Zero Time and Memory / / WEWoRC. 2009.
Rudskoy V. On zero practical significance of "Key recovery attack on full GOST block cipher with zero time and memory" / / h ttp ://ep rin t.ia cr.o rg /2010/ .
Шнайер Б. Прикладная криптография. Протоколы, алгоритмы, исходные тексты на языке Си. М.: Триумф, 2002.
 Attacks on full block cipher GOST 28147-89 with 2 or 4 related keys | Applied Discrete Mathematics. Supplement. 2010. № 3.

Attacks on full block cipher GOST 28147-89 with 2 or 4 related keys | Applied Discrete Mathematics. Supplement. 2010. № 3.