939
Views
7
CrossRef citations to date
0
Altmetric
Original Articles

On Multiple Symmetric Fixed Points in GOST

References

  • Alekseychuk, A. N. and L. V. Kovalchuk. 2011. Towards a Theory of Security Evaluation for GOST-like Ciphers against Differential and Linear Cryptanalysis, Preprint http://eprint.iacr.org/2011/489 (9 Sep).
  • Bard, G. V., S. V. Ault, and N. T. Courtois. 2012. “Statistics of Random Permutations and the Cryptanalysis Of Periodic Block Ciphers,” Cryptologia, 36(03):240–262.
  • Biham, E. and A. Shamir. 1991. “Differential Cryptanalysis of DES-like Cryptosystems,” Journal of Cryptology, 4:3–72. IACR.
  • Bogdanov, A., D. Khovratovich, and C. Rechberger. 2011. Biclique Cryptanalysis of the Full AES. In Asiacrypt 2011, LNCS 7073, pp. 344–371.
  • Courtois, N. 2011. Algebraic Complexity Reduction and Cryptanalysis of GOST, Preprint, http://eprint.iacr.org/2011/626, (12 November).
  • Courtois, N. 2012. “Security Evaluation of GOST 28147–89 in View of International Standardisation,” Cryptologia, 36(1):2–13.
  • Courtois, N. 2012. An Improved Differential Attack on Full GOST. Cryptology ePrint Archive, Report 2012/138. http://eprint.iacr.org/2012/138 (15 March).
  • Courtois, N. 2013. “Low-Complexity Key Recovery Attacks on GOST Block Cipher,” Cryptologia, 37(1):2–11.
  • Courtois, N. and M. Misztal. 2011. First Differential Attack on Full 32-Round GOST, ICICS'11, pp. 216–227. Springer LNCS 7043.
  • Courtois, N. and M. Misztal. 2011. Differential Cryptanalysis of GOST. Cryptology ePrint Archive, Report 2011/312. http://eprint.iacr.org/2011/312 (14 June).
  • Courtois, N. and M. Misztal. 2012. “Aggregated Differentials and Cryptanalysis of PP-1 and GOST. In CECC 2011, 11th Central European Conference on Cryptology,”. Periodica Mathematica Hungarica, 65(2):1126, doi:10.1007/s10998-012-2983-8.
  • Dinur, I., O. Dunkelman, and A. Shamir. 2012. Improved Attacks on Full GOST, FSE 2012, LNCS 7549, pp. 9–28. Early version available at http://eprint.iacr.org/2011/558/.
  • Good, I. J. and C. A. Deavours. 1981. Afterword to Marian Rejewski, “How Polish Mathematicians Deciphered the Enigma,” Annals of the History of Computing, 3(3):229–232.
  • Kara, O. 2008. “Reflection Cryptanalysis of Some Ciphers,” Indocrypt 2008, LNCS, 5365:294–307.
  • Kara, O. and F. Karakoç. 2012. Fixed Points of Special Type and Cryptanalysis of Full GOST. Proceedings CANS 2012, Darmstadt, Germany, December 12-14, Springer LNCS.
  • Knudsen, L. R. 1994. Truncated and Higher Order Differentials, FSE, pp. 196–211, LNCS 1008, Springer.
  • Kovalchuk, L. V. 2010. “Upper-Bound Estimation of the Average Probabilities of Integer-Valued Differentials in the Composition of Key Adder, Substitution Block, and Shift Operator,” Cybernetics and Systems Analysis, 46(6):936–944.
  • Moldovyan, N. A. 2007. Innovative Cryptography, 2nd ed. Boston: Charles River Media.
  • Random Permutation Statistics. 2008. Wikipedia, http://en.wikipedia.org/wiki/Random~ permutation statistics. (22 January).
  • Rejewski, M. 1981. “How Polish Mathematicians Deciphered the Enigma,” Annals of the History of Computing, 3(3):213–234.
  • Rejewski, M. 1982. “Mathematical Solution of the Enigma Cipher,” Cryptologia, 6(1):1–37.
  • Rudskoy, V. and A. Dmukh. 2012. Algebraic and Differential Cryptanalysis of GOST: Fact or Fiction. In CTCrypt 2012, Workshop on Current Trends in Cryptology, affiliated with 7th International Computer Science Symposium in Russia (CSR-2012), 2 July Nizhny Novgorod, Russia. An extended abstract is available at https://www.tc26.ru/invite/spisokdoc/CTCrypt_rudskoy.pdf. Slides are available at https://www.tc26.ru/documentary%20materials/CTCrypt%202012/slides/CTCrypt_rudskoy_slides_final.pdf.
  • Schneier, B. 1996. Section 14.1 GOST, In Applied Cryptography, 2nd ed., New York: John Wiley and Sons, ISBN 0-471-11709–9.
  • Seki, H. and T. Kaneko. 2000. Differential Cryptanalysis of Reduced Rounds of GOST. In SAC 2000, LNCS 2012, pp. 315–323, Springer.
  • Shorin, V. V., V. V. Jelezniakov, and E. M. Gabidulin. 2001. Linear and Differential Cryptanalysis of Russian GOST. Preprint submitted to Elsevier Preprint, 4 April.
  • Zabotin, I. A., G. P. Glazkov, and V. B. Isaeva. 1989. Cryptographic Protection for Information Processing Systems, Government Standard of the USSR, GOST 28147–89, Government Committee of the USSR for Standards.