Analysis of the GOST 28147-89 modes of operation that provide confidentiality
Prikladnaâ diskretnaâ matematika, no. 13 (2011), pp. 34-36.

Voir la notice de l'article provenant de la source Math-Net.Ru

In this research, the security estimation of the GOST 28147-89 modes against adaptive chosen-plaintext attack is executed. For each mode, the size of the data guaranteing preservation of the information confidentiality is defined.
@article{PDM_2011_13_a18,
     author = {I. A. Kukalo},
     title = {Analysis of the {GOST} 28147-89 modes of operation that provide confidentiality},
     journal = {Prikladna\^a diskretna\^a matematika},
     pages = {34--36},
     publisher = {mathdoc},
     number = {13},
     year = {2011},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDM_2011_13_a18/}
}
TY  - JOUR
AU  - I. A. Kukalo
TI  - Analysis of the GOST 28147-89 modes of operation that provide confidentiality
JO  - Prikladnaâ diskretnaâ matematika
PY  - 2011
SP  - 34
EP  - 36
IS  - 13
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDM_2011_13_a18/
LA  - ru
ID  - PDM_2011_13_a18
ER  - 
%0 Journal Article
%A I. A. Kukalo
%T Analysis of the GOST 28147-89 modes of operation that provide confidentiality
%J Prikladnaâ diskretnaâ matematika
%D 2011
%P 34-36
%N 13
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDM_2011_13_a18/
%G ru
%F PDM_2011_13_a18
I. A. Kukalo. Analysis of the GOST 28147-89 modes of operation that provide confidentiality. Prikladnaâ diskretnaâ matematika, no. 13 (2011), pp. 34-36. http://geodesic.mathdoc.fr/item/PDM_2011_13_a18/

[1] Bellare M., Rogaway P., Introduction to Modern Cryptography, 2005 http://cseweb.ucsd.edu/~mihir/cse207/w-se.pdf

[2] Goldwasser S., Bellare M., Lecture Notes on Cryptography, 2001 http://cseweb.ucsd.edu/~mihir/papers/gb.pdf

[3] Katz J., Yehuda L., Introduction to Modern Cryptography, Chapman Hall/CRC, Boca Raton, 2008