Voir la notice de l'article provenant de la source Math-Net.Ru
[1] Information technology. Cryptographic protection of information. Block ciphers, GOST R 34.12-2015, Standartinform, M., 2015 (in Russian)
[2] Information technology. Cryptographic data security. Modes of operation for block ciphers, GOST R 34.13-2015, Standartinform, M., 2015 (in Russian)
[3] Bellare M., Desai A., Jokipii E., Rogaway P., “A concrete security treatment of symmetric encryption”, Proc. 38th Ann. Symp. Found. Comput. Sci., FOCS '97, IEEE, 1997, 394–403 | DOI
[4] Popov V., Kurepkin I., Leontiev S., Additional cryptographic algorithms for use with GOST 28147-89, GOST R 34.10-94, GOST R 34.10-2001, and GOST R 34.11-94 algorithms, IETF RFC 4357, 2006
[5] Mironkin V., “On some probabilistic characteristics of the “CryptoPro Key Meshing” method”, Problemy Inform. Bezopasnosti. Komp'uternye systemy, 2015, no. 4 (In Russian)
[6] Matsui M., “Linear cryptanalysis method for DES cipher”, EUROCRYPT'93, Lect. Notes Comput. Sci., 765, 1994, 386–397 | DOI | Zbl
[7] Biham E., Shamir A., “Differential cryptanalysis of DES-like cryptosystems”, CRYPTO'90, Lect. Notes Comput. Sci., 537, 1990, 2–21 | DOI
[8] Cryptographic Protection for Data Processing System, Gosudarstvennyi Standard of USSR, GOST 28147-89, Government Committee of the USSR for Standards, 1989 (In Russian)
[9] Ahmetzyanova L. R., Alekseev E. K., Oshkin I. B., Smyshlyaev S. V., Sonina L. A., On the properties of the CTR encryption mode of the Magma and Kuznyechik block ciphers with rekeying method based on CryptoPro Key Meshing, Cryptology ePrint Archive, Report 2016/628, http://eprint.iacr.org/2016/628 | MR