Voir la notice de l'article provenant de la source Math-Net.Ru
[1] Shannon C. E., “Communication theory of secrecy systems”, Bell System Tech. J., 28:4 (1949), 656–715 ; Shennon K., “Teoriya svyazi v sekretnykh sistemakh”, Raboty po teorii informatsii i kibernetike, IL, M., 1963, 333–402 | DOI | MR | Zbl
[2] Biham E., Shamir A., “Differential cryptanalysis of DES-like cryptosystems”, J. Cryptology, 4 (1990), 3–72 | DOI | MR
[3] Matsui M., “Linear cryptanalysis method for DES cipher”, EUROCRYPT '93, Lect. Notes Comput. Sci., 765, 1994, 386–397 | DOI | Zbl
[4] Malyshev F. M., “Dvoistvennost raznostnogo i lineinogo metodov v kriptografii”, Matematicheskie voprosy kriptografii, 5:3 (2014), 35–47 | DOI | Zbl
[5] Kishan G., Indranil R., “Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applications”, Cryptogr. and Communic., 7 (2015), 257–287 | DOI | MR | Zbl
[6] Informatsionnaya tekhnologiya. Kriptograficheskaya zaschita informatsii. Funktsiya kheshirovaniya. GOST R 34.11 — 2012, Standartinform, M., 2013, 25 pp.
[7] Informatsionnaya tekhnologiya. Kriptograficheskaya zaschita informatsii. Blochnye shifry. GOST R 34.12 — 2015, Standartinform, M., 2015, 25 pp.
[8] Guo J., Peyrin T., Poschmann A., “The PHOTON family of lightweight hash functions”, CRYPTO 2011, Lect. Notes Comput. Sci., 6841, 2011, 222–239 | DOI | Zbl
[9] Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers, ISO/IEC 18033-3, 2010
[10] Diffie W., Ledin G., SMS4 encryption algorithm for wireless networks, IACR Cryptology ePrint Archive, Paper 2008/329, 2008 https://eprint.iacr.org/2008/329.pdf
[11] Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions, ISO/IEC 10118-3, 2004
[12] Dorokhin S.V., Kachkov S.S., Sidorenko A.A., “Realizatsiya blochnogo shifra “Kuznechik” s ispolzovaniem vektornykh instruktsii”, Trudy MFTI, 10:4 (2018), 45–53
[13] Lemire D., Kaser O., “Faster 64-bit universal hashing using carry-less multiplications”, J. Cryptogr. Eng., 6 (2015), 171–185 | DOI
[14] Fog A., Instruction tables: Lists of instruction latencies, throughputs and micro-operation breakdowns for Intel, AMD and VIA CPUs, Techn. Univ. of Denmark, 1996–2022, 469 pp. https://agner.org/optimize/instruction_tables.pdf
[15] Gueron S., “Intel's New AES instructions for enhanced performance and security”, FSE 2009, Lect. Notes Comput. Sci., 5665, 2009, 51–66 | DOI | Zbl