An algebraic approach to fix points of GOST-algorithm

Marcel Zanechal

Mathematica Slovaca (2001)

  • Volume: 51, Issue: 5, page 583-591
  • ISSN: 0139-9918

How to cite

top

Zanechal, Marcel. "An algebraic approach to fix points of GOST-algorithm." Mathematica Slovaca 51.5 (2001): 583-591. <http://eudml.org/doc/34546>.

@article{Zanechal2001,
author = {Zanechal, Marcel},
journal = {Mathematica Slovaca},
keywords = {GOST; fix point; cryptanalysis},
language = {eng},
number = {5},
pages = {583-591},
publisher = {Mathematical Institute of the Slovak Academy of Sciences},
title = {An algebraic approach to fix points of GOST-algorithm},
url = {http://eudml.org/doc/34546},
volume = {51},
year = {2001},
}

TY - JOUR
AU - Zanechal, Marcel
TI - An algebraic approach to fix points of GOST-algorithm
JO - Mathematica Slovaca
PY - 2001
PB - Mathematical Institute of the Slovak Academy of Sciences
VL - 51
IS - 5
SP - 583
EP - 591
LA - eng
KW - GOST; fix point; cryptanalysis
UR - http://eudml.org/doc/34546
ER -

References

top
  1. CHARNES C.-O'CONNOR L.-PIEPRZYK J.-SAFAVI-NAINI R.-ZHENG Y., Comments on Soviet encryption algorithm, Preprint, April 29, 1994. (1994) 
  2. Sistemy obrabotki informacii. Zashchita kryptograficheskaya, Algoritm kriptograficheskogo preobrazovaniya, Gosudarstvennyi Standart Soyuza SSR, GOST: 28147-89, IPK Izdatelstvo standartov, Moskva, 1989. (1989) 
  3. Cryptographic Protection for Data Processing Systems, Cryptographic Transformation Algorithm. Govеrnmеnt Standard of thе U.S.S.R., GOST: 28147-89 (Translatеd from thе Russian by Aleksandr Malchik), Sun Microsystеms Laboratoriеs, Mountain View, California August 20, 1994. (1994) 
  4. GROŠEK O.- NEMOGA K.-ZANECHAL M., Why to use bijective S -boxes in the G O S T ciphering algorithm, Informatica, Ljubljana (Slovеnia) (Submittеd). 
  5. KELSEY J.-SCHNEIER B.-WAGNER D., Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES, Advancеs in Cryptology - CRYPTO '96. Lеcturе Notеs in Comput. Sci. 1109, Springеr-Vеrlag, Bеrlin, 1996. (1996) MR1480681
  6. PIEPRZYK J.-TOMBAK L., Soviet encryption algorithm, Prеprint, Novembеr 24, 1993 and June 1, 1994. (1993) 
  7. SCHNEIER B., Applied Cryptography, (2nd еd.), J. Wilеy k, Sons, Nеw York, 1996. (1996) Zbl0883.94001

NotesEmbed ?

top

You must be logged in to post comments.

To embed these notes on your page include the following JavaScript code on your page where you want the notes to appear.

Only the controls for the widget will be shown in your chosen language. Notes will be shown in their authored language.

Tells the widget how many notes to show per page. You can cycle through additional notes using the next and previous controls.

    
                

Note: Best practice suggests putting the JavaScript code just before the closing </body> tag.