Cryptanalysis of GOST in the multiple-key scenario
From MaRDI portal
Recommendations
Cites work
- 256 bit standardized crypto for 650 GE -- GOST revisited
- A single-key attack on the full GOST block cipher
- Adavanced slide attacks
- An improved differential attack on full GOST
- Cryptanalysis of the GOST Hash Function
- Periodic ciphers with small blocks and cryptanalysis of Keeloq
- Reflection Cryptanalysis of Some Ciphers
Cited in
(21)- 256 bit standardized crypto for 650 GE -- GOST revisited
- Reflection Cryptanalysis of Some Ciphers
- scientific article; zbMATH DE number 1823207 (Why is no real title available?)
- Aggregated differentials and cryptanalysis of PP-1 and GOST
- Practical-time related-key attack on GOST with secret S-boxes
- A single-key attack on the full GOST block cipher
- Rotational cryptanalysis of GOST with identical S-boxes
- Contradiction immunity and guess-then-determine attacks on GOST
- Local reduction and the algebraic cryptanalysis of the block cipher GOST
- scientific article; zbMATH DE number 1689015 (Why is no real title available?)
- Linear and differential cryptanalysis of Russian GOST
- Generalized GOST
- Meet-in-the-middle attacks on reduced-round GOST
- Advanced truncated differential attacks against GOST block cipher and its variants
- An attack on the GOST 28147-89 block cipher with 12 related keys
- An improved differential attack on full GOST
- A single-key attack on the full GOST block cipher
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- Analysis of the GOST 28147-89 modes of operation that provide confidentiality
- Attacks on full block cipher GOST 28147-89 with 2 or 4 related keys
- Cryptanalysis of the Round-Reduced GOST Hash Function
This page was built for publication: Cryptanalysis of GOST in the multiple-key scenario
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5402654)