Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDM_2011_13_a18, author = {I. A. Kukalo}, title = {Analysis of the {GOST} 28147-89 modes of operation that provide confidentiality}, journal = {Prikladna\^a diskretna\^a matematika}, pages = {34--36}, publisher = {mathdoc}, number = {13}, year = {2011}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDM_2011_13_a18/} }
I. A. Kukalo. Analysis of the GOST 28147-89 modes of operation that provide confidentiality. Prikladnaâ diskretnaâ matematika, no. 13 (2011), pp. 34-36. http://geodesic.mathdoc.fr/item/PDM_2011_13_a18/
[1] Bellare M., Rogaway P., Introduction to Modern Cryptography, 2005 http://cseweb.ucsd.edu/~mihir/cse207/w-se.pdf
[2] Goldwasser S., Bellare M., Lecture Notes on Cryptography, 2001 http://cseweb.ucsd.edu/~mihir/papers/gb.pdf
[3] Katz J., Yehuda L., Introduction to Modern Cryptography, Chapman Hall/CRC, Boca Raton, 2008