- Home
- » Tags
- » GOST (block cipher)
Top View
- A Single-Key Attack on the Full GOST Block Cipher
- Modern Cryptanalysis.Pdf
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- View the Index
- Cryptanalysis of the GOST Hash Function
- Block Ciphers
- A Proposed Hybrid Cryptography Algorithm Based on GOST and Salsa (20)
- Algorithms, Key Size and Parameters Report – 2014
- 7.4.2 DES Algorithm DES Is a Feistel Cipher Which Processes Plaintext Blocks of N =64Bits, Producing 64-Bit Ciphertext Blocks (Figure 7.8)
- A New Encryption Standard of Ukraine: the Kalyna Block Cipher (DSTU 7624:2014)
- Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis Jongsung Kim, Seokhie Hong, Bart Preneel, Eli Biham, Orr Dunkelman, and Nathan Keller
- Enhanced Truncated Differential Cryptanalysis of GOST
- Arxiv:1705.08151V2 [Math.GR] 17 May 2018 1
- Differential Cryptanalysis of Reduced Rounds of GOST
- Developments in Authenticated Encryption
- A Lightweight-Friendly Modification of GOST Block Cipher
- My Crazy Boss Asked Me to Design a New Block Cipher. What's Next?
- An Improved Differential Attack on Full GOST - Extended Version, 17 December 2015∗
- Group Properties of Block Ciphers of the Russian Standards GOST R 34.11-2012 and GOST R 34.12-2015
- Side Channel Cryptanalysis of Product Ciphers
- New Linear Attacks on Block Cipher GOST
- Impossible Plaintext Cryptanalysis and Probable-Plaintext Collision Attacks of 64-Bit Block Cipher Modes
- Copyright by Gokhan Sayilar 2014 the Thesis Committee for Gokhan Sayilar Certifies That This Is the Approved Version of the Following Thesis
- Security Evaluation of GOST 28147-89 in View of International Standardisation
- Symmetric Cryptography
- Flex System X240 Compute Node E5-2600 V2
- General Cryptography Part 1 of 2
- Cryptography in Industrial Embedded Systems: Our Experience of Needs and Constraints
- Efficient Slide Attacks⋆
- Partitions in the S-Box of Streebog and Kuznyechik*
- Pdf/File/Ijatcse48922020.Pdf
- Gostcrypt User Guide
- Flex System X240 Compute Node (8737, E5-2600 V2) Product Guide (Withdrawn Product)
- Advanced Differential Cryptanalysis and GOST Cipher
- Cryptanalysis of the GOST Hash Function
- Cryptanalysis of Some AES-Based Cryptographic Primitives
- Cryptanalytic Attacks on International Data Encryption Algorithm Block Cipher
- Advanced Slide Attacks
- Cryptanalysis of Block Ciphers: a Survey
- Botan Reference Guide Release 2.18.1
- Copyrighted Material