Voir la notice de l'article provenant de la source Math-Net.Ru
[1] Information Processing Systems. Cryptographic Protection. Cryptographic Transformation Algorithm, GOST 28147-89 (in Russian)
[2] Poschmann A., Ling S., Wang H., “256 bit standardized Crypto for 650 GE – GOST Revisited”, CHES, Lect. Notes Comput. Sci., 6225, 2010, 219–233 | Zbl
[3] Isobe T., “A single-key attack on the full GOST block cipher”, FSE 2011, Lect. Notes Comput. Sci., 6733, 2011, 290–305 | MR | Zbl
[4] Dinur I., Dunkelman O., Shamir A., Improved attacks on full GOST, Cryptology, ePrint Archive, Report 2011/558, , 2011 http://eprint.iacr.org/2011/558
[5] ISO/IEC JTC 1/SC 27 Standing Document 12 (SD12) on the Assessment of cryptographic algorithms and key lengths, http://www.jtc1sc27.din.de/sbe/SD12
[6] Dygin D. M., Dmukh A. A., Marshalko G. B., “A lightweight-friendly modification of GOST block cipher”, Matematichskie voprosy kriptografii, 5:2 (2014), 47–55
[7] Shishkin V. A., Design principles of a prospective block cipher with 128 bit block length, Presentation at RusCrypto'2013, (in Russian) http://www.ruscrypto.ru/accotiation/archive/rc2013/