Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDMA_2020_13_a19, author = {K. D. Tsaregorodtsev}, title = {Analysis of block cipher modes of operation for {RFID} devices}, journal = {Prikladnaya Diskretnaya Matematika. Supplement}, pages = {67--69}, publisher = {mathdoc}, number = {13}, year = {2020}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDMA_2020_13_a19/} }
K. D. Tsaregorodtsev. Analysis of block cipher modes of operation for RFID devices. Prikladnaya Diskretnaya Matematika. Supplement, no. 13 (2020), pp. 67-69. http://geodesic.mathdoc.fr/item/PDMA_2020_13_a19/
[1] Katz J., Lindell Y., Introduction to Modern Cryptography, 2nd Ed., Chapman Hall/CRC, 2014 | MR
[2] Mezhgosudarstvennyi standart GOST 34.13-2018 Informatsionnaya tekhnologiya (IT). Kriptograficheskaya zaschita informatsii. Rezhimy raboty blochnykh shifrov, Standartinform, M., 2018
[3] Ahmetzyanova L. R., Alekseev E. K., Oshkin I. B., et al., “On the properties of the CTR encryption mode of Magma and Kuznyechik block ciphers with re-keying method based on CryptoPro Key Meshing”, Matem. vopr. kriptogr., 8:2 (2017), 39–50 | MR
[4] Rogaway P., Evaluation of Some Block Cipher Modes of Operation, , 2011 https://web.cs.ucdavis.edu/r̃ogaway/papers/modes.pdf
[5] Wooding M., New Proofs for Old Modes, IACR Cryptology ePrint Archive, 2008
[6] Bellare M., Desai A., Jokipii E., Rogaway P., “A concrete security treatment of symmetric encryption”, Proc. 38th Ann. Symp. Foundations of Computer Science, IEEE, 1997, 394–403 | DOI