Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDM_2010_12_a12, author = {M. A. Pudovkina and G. I. Khoruzhenko}, title = {Attacks on full block cipher {GOST} 28147-89 with~2 or~4 related keys}, journal = {Prikladna\^a diskretna\^a matematika}, pages = {29--30}, publisher = {mathdoc}, number = {12}, year = {2010}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDM_2010_12_a12/} }
M. A. Pudovkina; G. I. Khoruzhenko. Attacks on full block cipher GOST 28147-89 with~2 or~4 related keys. Prikladnaâ diskretnaâ matematika, no. 12 (2010), pp. 29-30. http://geodesic.mathdoc.fr/item/PDM_2010_12_a12/
[1] Seki H., Kaneko T., “Differential cryptanalysis of reduced rounds of gost”, Selected Areas in Cryptography, LNSC, 2012, Springer, 2000, 315–323 | MR
[2] Biham E., Dunkelman O., Keller N., “Improved slide attacks”, LNCS, 4593, 2007, 153–166 | Zbl
[3] Kara O., “Reflection Cryptanalysis of Some Ciphers”, LNCS, 5365, 2008, 294–307 | MR | Zbl
[4] Ko Y., Hong S., Lee W., et al., “Related key differential attacks on 27 rounds of xtea and full-round gost”, LNCS, 3017, 2004, 299–316 | Zbl
[5] Fleischmann E., Gorski M., Huhne J.-H., Lucks S., “Key Recovery Attack on full GOST Block Cipher with Zero Time and Memory”, WEWoRC, 2009
[6] Rudskoy V., On zero practical significance of “Key recovery attack on full GOST block cipher with zero time and memory” http://eprint.iacr.org/2010/
[7] Shnaier B., Prikladnaya kriptografiya. Protokoly, algoritmy, iskhodnye teksty na yazyke Si, Triumf, M., 2002