An algebraic approach to fix points of GOST-algorithm
Mathematica slovaca, Tome 51 (2001) no. 5, pp. 583-591
Cet article a éte moissonné depuis la source Czech Digital Mathematics Library

Voir la notice de l'article

Classification : 68P25, 94A60
@article{MASLO_2001_51_5_a7,
     author = {Zanechal, Marcel},
     title = {An algebraic approach to fix points of {GOST-algorithm}},
     journal = {Mathematica slovaca},
     pages = {583--591},
     year = {2001},
     volume = {51},
     number = {5},
     mrnumber = {1899278},
     zbl = {1004.68065},
     language = {en},
     url = {http://geodesic.mathdoc.fr/item/MASLO_2001_51_5_a7/}
}
TY  - JOUR
AU  - Zanechal, Marcel
TI  - An algebraic approach to fix points of GOST-algorithm
JO  - Mathematica slovaca
PY  - 2001
SP  - 583
EP  - 591
VL  - 51
IS  - 5
UR  - http://geodesic.mathdoc.fr/item/MASLO_2001_51_5_a7/
LA  - en
ID  - MASLO_2001_51_5_a7
ER  - 
%0 Journal Article
%A Zanechal, Marcel
%T An algebraic approach to fix points of GOST-algorithm
%J Mathematica slovaca
%D 2001
%P 583-591
%V 51
%N 5
%U http://geodesic.mathdoc.fr/item/MASLO_2001_51_5_a7/
%G en
%F MASLO_2001_51_5_a7
Zanechal, Marcel. An algebraic approach to fix points of GOST-algorithm. Mathematica slovaca, Tome 51 (2001) no. 5, pp. 583-591. http://geodesic.mathdoc.fr/item/MASLO_2001_51_5_a7/

[1] CHARNES C.-O'CONNOR L.-PIEPRZYK J.-SAFAVI-NAINI R.-ZHENG Y.: Comments on Soviet encryption algorithm. Preprint, April 29, 1994.

[2] Sistemy obrabotki informacii. Zashchita kryptograficheskaya, Algoritm kriptograficheskogo preobrazovaniya. Gosudarstvennyi Standart Soyuza SSR, GOST: 28147-89, IPK Izdatelstvo standartov, Moskva, 1989.

[3] Cryptographic Protection for Data Processing Systems. Cryptographic Transformation Algorithm. Govеrnmеnt Standard of thе U.S.S.R., GOST: 28147-89 (Translatеd from thе Russian by Aleksandr Malchik), Sun Microsystеms Laboratoriеs, Mountain View, California August 20, 1994.

[4] GROŠEK O.- NEMOGA K.-ZANECHAL M.: Why to use bijective $S$-boxes in the $GOST$ ciphering algorithm. Informatica, Ljubljana (Slovеnia) (Submittеd).

[5] KELSEY J.-SCHNEIER B.-WAGNER D.: Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. Advancеs in Cryptology - CRYPTO '96. Lеcturе Notеs in Comput. Sci. 1109, Springеr-Vеrlag, Bеrlin, 1996. | MR

[6] PIEPRZYK J.-TOMBAK L. : Soviet encryption algorithm. Prеprint, Novembеr 24, 1993 and June 1, 1994.

[7] SCHNEIER B.: Applied Cryptography. (2nd еd.), J. Wilеy k, Sons, Nеw York, 1996. | Zbl