Voir la notice de l'article provenant de la source Math-Net.Ru
[1] Fuller J., Millan W., “Linear redundancy in S-boxes”, Fast Software Encryption, Lect. Notes Comput. Sci., 6061, 2010, 73–80 | DOI
[2] Daemen J., Rijmen V., The Design of Rijndael: AES — The Advanced Encryption Standard, Springer, Heidelberg etc., 2002, xvii+238 pp. | MR | Zbl
[3] Aoki K., Ichikawa T., Kanda M., Matsui M., Moriai S., Nakajima J., Tokita T., “Camellia: A 128-bit block cipher suitable for multiple platforms-design and analysis”, Selected Areas in Cryptography, Lect. Notes Comput. Sci., 2012, 2001, 39–56 | DOI | MR | Zbl
[4] Rijmen V., Daemen J., Preneel B., Bosselaers A., De Win E., “The cipher SHARK”, Fast Software Encryption, Lect. Notes Comput. Sci., 1039, 1996, 99–111 | DOI
[5] Ivanov G., Nikolov N., Nikova S., Reversed genetic algorithms for generation of bijective S-boxes with good cryptographic properties, Cryptology ePrint Archive, Report 2014/801, , 2014 http://eprint/iacr.org/2014/801.pdf
[6] Youssef A. M., Tavares S. E., “Affine equivalence in the AES round function”, Discrete Appl. Math., 148:2 (2005), 161–170 | DOI | MR | Zbl
[7] Lidl R., Niederreiter H., Finite Fields, 2nd ed., Cambridge Univ. Press, Cambridge, 1997, xiv+755 pp. | MR
[8] Dygin D. M., Lavrikov I. V., Marshalko G. B., Rudskoy V. I., Trifonov D. I., Shishkin V. A., “On a new Russian Encryption Standard”, Mathematical Aspects of Cryptography, 6:2 (2015), 29–34 | MR
[9] Information technology. Cryptographic Data Security. Block ciphers, GOST R 34.12-2015. Federal Agency on Technical Regulating and Metrology, Standardinform, M., 2015 (In Russian)