A lightweight-friendly modification of GOST block cipher
Matematičeskie voprosy kriptografii, Tome 5 (2014) no. 2, pp. 47-55 Cet article a éte moissonné depuis la source Math-Net.Ru

Voir la notice de l'article

We study the possibility to modify the GOST block cipher to resist Isobe and Dinu–Dunkelman–Shamir attacks, and, at the same time, to remain to be suitable for lightweight realization.
@article{MVK_2014_5_2_a5,
     author = {A. A. Dmukh and D. M. Dygin and G. B. Marshalko},
     title = {A~lightweight-friendly modification of {GOST} block cipher},
     journal = {Matemati\v{c}eskie voprosy kriptografii},
     pages = {47--55},
     year = {2014},
     volume = {5},
     number = {2},
     language = {en},
     url = {http://geodesic.mathdoc.fr/item/MVK_2014_5_2_a5/}
}
TY  - JOUR
AU  - A. A. Dmukh
AU  - D. M. Dygin
AU  - G. B. Marshalko
TI  - A lightweight-friendly modification of GOST block cipher
JO  - Matematičeskie voprosy kriptografii
PY  - 2014
SP  - 47
EP  - 55
VL  - 5
IS  - 2
UR  - http://geodesic.mathdoc.fr/item/MVK_2014_5_2_a5/
LA  - en
ID  - MVK_2014_5_2_a5
ER  - 
%0 Journal Article
%A A. A. Dmukh
%A D. M. Dygin
%A G. B. Marshalko
%T A lightweight-friendly modification of GOST block cipher
%J Matematičeskie voprosy kriptografii
%D 2014
%P 47-55
%V 5
%N 2
%U http://geodesic.mathdoc.fr/item/MVK_2014_5_2_a5/
%G en
%F MVK_2014_5_2_a5
A. A. Dmukh; D. M. Dygin; G. B. Marshalko. A lightweight-friendly modification of GOST block cipher. Matematičeskie voprosy kriptografii, Tome 5 (2014) no. 2, pp. 47-55. http://geodesic.mathdoc.fr/item/MVK_2014_5_2_a5/

[1] Government Standard of the USSR, GOST 28147-89, Government Committee of the USSR for Standards, 1989 (In Russian)

[2] Poschmann A., Ling S., Wang H., “256 bit standardized crypto for 650 GE – GOST revisited”, CHES 2010, Lect. Notes Comput. Sci., 6225, 2010, 219–233 | DOI

[3] Isobe T., “A single-key attack on the full GOST block cipher”, Lect. Notes Comput. Sci., 6733, 2011, 290–305 | DOI | MR

[4] Dinur I., Dunkelman O., Shamir A., Improved attacks on full GOST, Cryptology ePrint Archive, Report 2011/558, 2011

[5] Rudskoy V. I., “On several approaches for the estimation of the effectiveness of related-key attacks”, RusCrypto' 2011, 2011 (In Russian) http://www.ruscrypto.ru/

[6] ISO/IEC JTC 1/SC 27 Standing Document 12 (SD12) on the Assessment of cryptographic algorithms and key lengths

[7] Leander G., Poschmann A., “On the classification of 4-bit $S$-boxes”, WAIFI, Lect. Notes Comput. Sci., 4547, 2007, 159–176 | DOI | MR | Zbl