Voir la notice de l'article provenant de la source Math-Net.Ru
[1] Pieprzyk J., Tombak L., Soviet Encryption Algorithm, , 1994 http://freeworld.thc.org/root/phun/stego-challenge/gost-spec.pdf
[2] OpenSSL Software Foundation OpenSSL version 1.0.0, , 2010 http://www.openssl.org/
[3] National Institute of Standards and Technology FIPS PUB 46-3: Data Encryption Standard (DES), 1999, Supersedes FIPS 46-2
[4] Isobe T., “A single-key attack on the full GOST block cipher”, FSE, Lect. Notes Comput. Sci., 6733, 2011, 290–305 | DOI | MR
[5] Seki H., Kaneko T., “Differential cryptanalysis of reduced rounds of GOST”, Selected areas in cryptography, Lect. Notes Comput. Sci., 2012, 2005, 315–323 | DOI | MR
[6] Biham E., Dunkelman O., Keller N., “Improved Slide Attacks”, FSE, Lect. Notes Comput. Sci., 4593, 2007, 153–166 | DOI | Zbl
[7] Kara O., “Reflection cryptanalysis of some ciphers”, INDOCRYPT, Lect. Notes Comput. Sci., 5365, 2008, 294–307 | DOI | MR | Zbl
[8] Dinur I., Dunkelman O., Shamir A., Improved attacks on full GOST, Cryptology ePrint Archive, Report 2011/558, http://eprint.iacr.org/
[9] Sekar G., Mouha N., Velichkov V., Preneel B., “Meet-in-the-middle attacks on reduced-round XTEA”, CT-RSA, Lect. Notes Comput. Sci., 6558, 2011, 250–267 | DOI | MR | Zbl
[10] Shannon C. E., “Communication theory of secrecy systems”, Bell System Technical Journal, 28 (1949), 656–715 | DOI | MR | Zbl
[11] Biryukov A., Wagner D., “Advanced slide attacks”, EUROCRYPT, Lect. Notes Comput. Sci., 1807, 2000, 589–606 | DOI
[12] Saarinen M.-J., A chosen key attack against the secret S-boxes of GOST, , 1998 http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.41.5532