Voir la notice de l'article provenant de la source Math-Net.Ru
[1] Shishkin V.A., Lavrikov I.V., Marshalko G.B., Rudskoy V.I., Mechanisms of derivative key generation. Results of cryptographic research and justification for cryptographic qualities, TC 26, M., 2017 (in Russian)
[2] Gorelov M.A., Simple optimization problems. Non-algebraic transformations, Dorodnicyn Computing Centre of RAS, M., 2012, 63 pp. (in Russian)
[3] GOST P 34.12–2015. Information technology. Cryptographic data security. Block ciphers, Standardinform, M., 2015 (in Russian)
[4] GOST P 34.13–2015. Information technology. Cryptographic protection of information. Modes of operation of block ciphers, Standardinform, M., 2016 (in Russian)
[5] Recommendations for standardisation P 1323565.1.022-2018. Information technology. Cryptographic protection of information. Key derivation function, Standardinform, M., 2018 (in Russian)
[6] Methodological recommendations MP 26.2.005-2001. Block ciphers mode of operation designed to protect of data storage medium with a block-oriented structure, TC 26, M., 2021 (in Russian)
[7] Damgård I., Nielsen J.B., “Expanding pseudorandom functions; or: from known-plaintext security to chosen-plaintext security”, CRYPTO 2002, Lect. Notes Comput. Sci., 2442, 2002, 449–464 | DOI | MR
[8] Iwata T., Kurosawa K., “OMAC: One-Key CBC MAC”, FSE 2003, Lect. Notes Comput. Sci., 2887, 2003, 129–153 | DOI | MR