Voir la notice de l'article provenant de la source Math-Net.Ru
[1] GOST R 34.11-2012, Natsionalnyi standart Rossiiskoi Federatsii. Informatsionnaya tekhnologiya. Kriptograficheskaya zaschita informatsii. Funktsiya kheshirovaniya, Standartinform, Moskva, 2012
[2] Mendel F., Pramstaller N., Rechberger C., Kontak M., Szmidt J., “Cryptanalysis of the GOST hash function”, CRYPTO'2008, Lect. Notes Comput. Sci., 5157, 2008, 162–178 | MR | Zbl
[3] AlTawy R., Kircanski A., Youssef A. M., Rebound attacks on Stribog, IACR Cryptology ePrint Archive, , 2013 http://eprint.iacr.org/2013/539 | MR
[4] Wang Z., Yu H., Wang X., Cryptanalysis of GOST R hash function, IACR Cryptology ePrint Archive, , 2013 http://eprint.iacr.org/2013/584
[5] Dodis Y., Ristenpart T., Shrimpton T., Salvaging Merkle-Damg?ard for practical applications, IACR Cryptology ePrint Archive, , 2009 http://eprint.iacr.org/2009/177 | MR
[6] Stam M., Blockcipher based hashing revisited, IACR Cryptology ePrint Archive, , 2008 http://eprint.iacr.org/2008/071
[7] AlTawy R., Youssef A. M., Preimage attacks on reduced-round Stribog, IACR Cryptology ePrint Archive, , 2014 http://eprint.iacr.org/2014/319 | MR
[8] AlTawy R., Youssef A. M., Watch your constants: malicious Streebog, IACR Cryptology ePrint Archive, , 2014 http://eprint.iacr.org/2014/879
[9] Ma B., Li B., Hao R., Li X., Improved cryptanalysis on reduced-round GOST and Whirlpool hash function (Full version), IACR Cryptology ePrint Archive, , 2014 http://eprint.iacr.org/2014/375