Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDMA_2023_16_a26, author = {A. A. Shcherbachenko}, title = {An approach to construct a keyed {PRF} from the {``MAGMA''} block cipher}, journal = {Prikladnaya Diskretnaya Matematika. Supplement}, pages = {105--110}, publisher = {mathdoc}, number = {16}, year = {2023}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDMA_2023_16_a26/} }
TY - JOUR AU - A. A. Shcherbachenko TI - An approach to construct a keyed PRF from the ``MAGMA'' block cipher JO - Prikladnaya Diskretnaya Matematika. Supplement PY - 2023 SP - 105 EP - 110 IS - 16 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/PDMA_2023_16_a26/ LA - ru ID - PDMA_2023_16_a26 ER -
A. A. Shcherbachenko. An approach to construct a keyed PRF from the ``MAGMA'' block cipher. Prikladnaya Diskretnaya Matematika. Supplement, no. 16 (2023), pp. 105-110. http://geodesic.mathdoc.fr/item/PDMA_2023_16_a26/
[1] Mennink B. and Neves S., “Optimal PRFs from blockcipher designs”, IACR Trans. Symmetric Cryptology, 2017, no. 3, 228–252 | DOI
[2] GOST 34.12-2018. Informatsionnaya tekhnologiya. Kriptograficheskaya zaschita informatsii. Blochnye shifry, Standartinform, M., 2018
[3] Bellare M. and Rogaway P., Introduction to Modern Cryptography, University of California at Davis, 2005, 283 pp. | MR
[4] Isobe T., “A single-key attack on the full GOST block cipher”, J. Cryptol., 26:1 (2013), 172–189 | DOI | MR | Zbl
[5] Dinur I., Dunkelman O., and Shamir A., “Improved attacks on full GOST”, LNCS, 7549, 2012, 9–28 | Zbl
[6] Derbez P., Iwata T., Sun L., et al., “Cryptanalysis of AES-PRF and its dual”, IACR Trans. Symmetric Cryptology, 2018, no. 2, 161–191 | DOI
[7] GOST 34.13-2018. Informatsionnaya tekhnologiya. Kriptograficheskaya zaschita informatsii. Rezhimy raboty blochnykh shifrov, Standartinform, M., 2018
[8] R 1323565.1.017-2018. Informatsionnaya tekhnologiya. Kriptograficheskaya zaschita informatsii. Kriptograficheskie algoritmy, soputstvuyuschie primeneniyu algoritmov blochnogo shifrovaniya, Standartinform, M., 2018
[9] Ahmetzyanova L. R., Alekseev E. K., Sedov G. K., et al., “Practical significance of security bounds for standardized internally re-keyed block cipher modes”, Matematicheskie voprosy kriptografii, 10:2 (2019), 31–46 | DOI | MR | Zbl
[10] Dworkin M., NIST SP 800-38D. Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC, Technical Report, Gaithersburg, MD, United States, 2007