Voir la notice de l'article provenant de la source Math-Net.Ru
[1] B.A. Pogorelova, V.N. Sachkov (red.), Slovar kriptograficheskikh terminov, MTsNMO, M., 2006, 94 pp.
[2] Schnorr C.-P., Vaudenay S., “Black box cryptanalysis of hash networks based on multipermutations”, EUROCRYPT'94, Lect. Notes Comput. Sci., 950, 1995, 47–57 | DOI | MR | Zbl
[3] Vaudenay S., “On the need for multipermutations: cryptanalysis of MD4 and SAFER”, FSE 1994, Lect. Notes Comput. Sci., 1008, 1995, 286–297 | DOI | Zbl
[4] Massey J. L., “SAFER K-64: a byte-oriented block-ciphering algorithm”, FSE 1993, Lect. Notes Comput. Sci., 809, 1994, 1–17 | DOI | Zbl
[5] Lipmaa H., “On differential properties of pseudo-Hadamard transform and related mappings”, INDOCRYPT 2002, Lect. Notes Comput. Sci., 2551, 2002, 48–61 | DOI | Zbl
[6] Pogorelov B.A., Pudovkina M.A., “Variatsii ortomorfizmov i psevdoadamarovykh preobrazovanii na neabelevoi gruppe”, Prikladnaya diskretnaya matematika. Prilozhenie, 12 (2019), 24–27
[7] Pogorelov B.A., Pudovkina M.A., “Obobschennye kvazi-adamarovy preobrazovaniya na konechnykh gruppakh”, Matematicheskie voprosy kriptografii, 13:4 (2022), 97–124 | DOI | MR | Zbl
[8] St Denis T., Fast pseudo-Hadamard transforms, Cryptology ePrint Archive, Report 2004/010, , 2004 https://eprint.iacr.org/2004/010.pdf
[9] Hall M., Paige L. J., “Complete mappings of finite groups”, Pacific J. Math., 5 (1955), 541–549 | DOI | MR | Zbl
[10] Pogorelov B.A., Pudovkina M.A., “O rasstoyaniyakh ot podstanovok do imprimitivnykh grupp pri fiksirovannoi sisteme imprimitivnosti”, Diskretnaya matematika, 25:3 (2013), 78–95 | DOI
[11] Stern J., Vaudenay S., “CS-CIPHER”, FSE 1998, Lect. Notes Comput. Sci., 1327, 1998, 189–204 | DOI