RUS  ENG
Полная версия
ЖУРНАЛЫ // Математические вопросы криптографии

Матем. вопр. криптогр., 2020, том 11, выпуск 2, страницы 53–67 (Mi mvk321)

Related-key attack on 5-round Kuznyechik
V. A. Kiryukhin

Список литературы

1. GOST R 34.12-2015. National standard of the Russian Federation. Information technology Cryptographic data security Block ciphers, 2015 (in Russian)
2. Alekseev E., Goncharenko K., Marshalko G., “Provably secure counter mode with related-key-based internal re-keying”, J. Comput. Virol. Hack. Tech., 2020  crossref  scopus
3. Tiessen T., “Polytopic cryptanalysis”, EUROCRYPT 2016, v. I, Lect. Notes Comput. Sci., 9665, 2016, 214–239  crossref  mathscinet  zmath
4. Daemen J., Knudsen L., Rijmen V., “The block cipher Square”, FSE 1997, Lect. Notes Comput. Sci., 1267, 1997, 149–165  crossref  zmath
5. Barreto P., Rijmen V., “The Khazad legacy-level block cipher”, First open NESSIE Workshop (KU-Leuven, 2000), Submission to NESSIE
6. Biham E., “New types of cryptoanalytic attacks using related keys”, EUROCRYPT 93, Lect. Notes Comput. Sci., 765, 1993, 398–409  crossref


© МИАН, 2026