Cryptographic properties of a new national encryption standard of Ukraine
DOI10.1007/S10559-016-9835-0zbMATH Open1391.94722OpenAlexW2403607458WikidataQ123222456 ScholiaQ123222456MaRDI QIDQ334235FDOQ334235
Authors: A. N. Alekseychuk, A. S. Shevtsov, Sergey Yakovlev, L. V. Koval'chuk
Publication date: 1 November 2016
Published in: Cybernetics and Systems Analysis (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10559-016-9835-0
Recommendations
- Results of Ukrainian national public cryptographic competition
- Single key recovery attacks on 9-round Kalyna-128/256 and Kalyna-256/512
- Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512
- Group properties of block ciphers of the Russian standards GOST R 34.11-2012 and GOST R 34.12-2015
- On a new Russian encryption standard
finite permutation groupblock cipherdifferential cryptanalysislinear cryptanalysissymmetric cryptographycipher ``Kalynanational encryption standard of Ukraine
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Decorrelation: a theory for block cipher security
- On sufficient conditions to generate the alternating group by \(SA\)-permutations
- Title not available (Why is that?)
- Title not available (Why is that?)
- Fast Software Encryption
- Improving the upper bound on the maximum differential and the maximum linear hull probability for SPN structures and AES.
Cited In (9)
- Upper bounds on the imbalance of discrete functions implemented by sequences of finite automata
- Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512
- Results of Ukrainian national public cryptographic competition
- Single key recovery attacks on 9-round Kalyna-128/256 and Kalyna-256/512
- Krip: high-speed hardware-oriented stream cipher based on a non-autonomous nonlinear shift register
- Kupy-Neev hash function
- Security of the Poseidon hash function against non-binary differential and linear attacks
- A method of evaluating the security of Snow 2.0-like ciphers against correlation attacks over the finite extensions of two element field
- Side-channeling the \textsf{Kalyna} key expansion
This page was built for publication: Cryptographic properties of a new national encryption standard of Ukraine
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q334235)