An algebraic approach to fix points of GOST-algorithm
Mathematica Slovaca (2001)
- Volume: 51, Issue: 5, page 583-591
- ISSN: 0232-0525
Access Full Article
topHow to cite
topZanechal, Marcel. "An algebraic approach to fix points of GOST-algorithm." Mathematica Slovaca 51.5 (2001): 583-591. <http://eudml.org/doc/34546>.
@article{Zanechal2001,
author = {Zanechal, Marcel},
journal = {Mathematica Slovaca},
keywords = {GOST; fix point; cryptanalysis},
language = {eng},
number = {5},
pages = {583-591},
publisher = {Mathematical Institute of the Slovak Academy of Sciences},
title = {An algebraic approach to fix points of GOST-algorithm},
url = {http://eudml.org/doc/34546},
volume = {51},
year = {2001},
}
TY - JOUR
AU - Zanechal, Marcel
TI - An algebraic approach to fix points of GOST-algorithm
JO - Mathematica Slovaca
PY - 2001
PB - Mathematical Institute of the Slovak Academy of Sciences
VL - 51
IS - 5
SP - 583
EP - 591
LA - eng
KW - GOST; fix point; cryptanalysis
UR - http://eudml.org/doc/34546
ER -
References
top- CHARNES C.-O'CONNOR L.-PIEPRZYK J.-SAFAVI-NAINI R.-ZHENG Y., Comments on Soviet encryption algorithm, Preprint, April 29, 1994. (1994)
- Sistemy obrabotki informacii. Zashchita kryptograficheskaya, Algoritm kriptograficheskogo preobrazovaniya, Gosudarstvennyi Standart Soyuza SSR, GOST: 28147-89, IPK Izdatelstvo standartov, Moskva, 1989. (1989)
- Cryptographic Protection for Data Processing Systems, Cryptographic Transformation Algorithm. Govеrnmеnt Standard of thе U.S.S.R., GOST: 28147-89 (Translatеd from thе Russian by Aleksandr Malchik), Sun Microsystеms Laboratoriеs, Mountain View, California August 20, 1994. (1994)
- GROŠEK O.- NEMOGA K.-ZANECHAL M., Why to use bijective -boxes in the ciphering algorithm, Informatica, Ljubljana (Slovеnia) (Submittеd).
- KELSEY J.-SCHNEIER B.-WAGNER D., Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES, Advancеs in Cryptology - CRYPTO '96. Lеcturе Notеs in Comput. Sci. 1109, Springеr-Vеrlag, Bеrlin, 1996. (1996) MR1480681
- PIEPRZYK J.-TOMBAK L., Soviet encryption algorithm, Prеprint, Novembеr 24, 1993 and June 1, 1994. (1993)
- SCHNEIER B., Applied Cryptography, (2nd еd.), J. Wilеy k, Sons, Nеw York, 1996. (1996) Zbl0883.94001
NotesEmbed ?
topTo embed these notes on your page include the following JavaScript code on your page where you want the notes to appear.