Voir la notice de l'article provenant de la source Math-Net.Ru
[1] Isobe T., “A single-key attack on the full GOST block cipher”, Lect. Notes Comput. Sci., 6733, 2011, 290–305 | DOI | MR | Zbl
[2] Dinur I., Dunkelman O., Shamir A., Improved attacks on full GOST, Cryptology ePrint Archive, Report 2011/558, http://eprint.iacr.org/2011/558
[3] Standart kriptograficheskoi zaschity dannykh, GOST 28147-89, Gos. komitet SSSR po standartizatsii, 1989
[4] Informatsionnaya tekhnologiya. Kriptograficheskaya zaschita informatsii. Blochnye shifry, GOST R 34.12-2015, Standartinform, M., 2015
[5] Dmukh A., Dygin D., Marshalko G., A lightweight-friendly modification of GOST block cipher, Cryptology ePrint Archive, Report 2015/065, http://eprint.iacr.org/2015/065
[6] Ashur T., Bar-On A., Dunkelman O., Cryptanalysis of GOST2, Cryptology ePrint Archive, Report 2016/532, http://eprint.iacr.org/2016/532
[7] Poschmann A., Ling S., Wang H., “256 bit standardized Crypto for 650 GE - GOST Revisited”, Lect. Notes Comput. Sci., 6225, 2010, 219–233 | DOI | Zbl
[8] Sachkov V. N., Veroyatnostnye metody v kombinatornom analize, Nauka, M., 1978, 288 pp.