Voir la notice de l'article provenant de la source Math-Net.Ru
[1] GOST R 34.12-2015. National standard of the Russian Federation. Information technology Cryptographic data security Block ciphers, 2015 (in Russian)
[2] Alekseev E., Goncharenko K., Marshalko G., “Provably secure counter mode with related-key-based internal re-keying”, J. Comput. Virol. Hack. Tech., 2020 | DOI
[3] Tiessen T., “Polytopic cryptanalysis”, EUROCRYPT 2016, v. I, Lect. Notes Comput. Sci., 9665, 2016, 214–239 | DOI | MR | Zbl
[4] Daemen J., Knudsen L., Rijmen V., “The block cipher Square”, FSE 1997, Lect. Notes Comput. Sci., 1267, 1997, 149–165 | DOI | Zbl
[5] Barreto P., Rijmen V., “The Khazad legacy-level block cipher”, First open NESSIE Workshop (KU-Leuven, 2000), Submission to NESSIE
[6] Biham E., “New types of cryptoanalytic attacks using related keys”, EUROCRYPT 93, Lect. Notes Comput. Sci., 765, 1993, 398–409 | DOI