DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» GOST (hash function)
GOST (hash function)
The Missing Difference Problem, and Its Applications to Counter Mode
Linear-XOR and Additive Checksums Don't Protect Damgård-Merkle
On Hash Functions Using Checksums
Algebraic Cryptanalysis of GOST Encryption Algorithm
GOST R 34.12-2015: Block Cipher "Magma"
GCM, GHASH and Weak Keys
Algebraic Complexity Reduction and Cryptanalysis of GOST Nicolas T
Gene Ontology Mining Tool Gost Master’S Thesis
Pycryptodome Documentation Release 3.10.4
Understanding How to Prevent Sensitive Data Exposure
Simple AEAD Hardware Interface (SÆHI) in a Soc: Implementing an On-Chip Keyak/Whirlbob Coprocessor
Stribobr2: “WHIRLBOB”
A Single-Key Attack on the Full GOST Block Cipher
Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function (Full Version)?
Algebraic Aspects of the Russian Hash Standard GOST R 34.11-2012
Building a More Assured HSM with a More Assured Tool-Chain the Need
View the Index
Cryptanalysis of the GOST Hash Function
Top View
Hashes for the Masses
Block Ciphers
The CTR Mode with Encrypted Nonces and Its Extension to AE
A Proposed Hybrid Cryptography Algorithm Based on GOST and Salsa (20)
Algorithms, Key Size and Parameters Report – 2014
Ensemble Approach to Failure-Resistant Password-Based Key Derivation Functions
A New Encryption Standard of Ukraine: the Kalyna Block Cipher (DSTU 7624:2014)
Enhanced Truncated Differential Cryptanalysis of GOST
Developments in Authenticated Encryption
STRIBOB : Authenticated Encryption from GOST R 34.11-2012 LPS Or Whirlpool
Black-Box Collision Attacks on the Compression Function of the Gost Hash Function
Differential Fault Analysis of Streebog
A Sage Library for Analysis of Nonlinear Binary Mappings
A Lightweight-Friendly Modification of GOST Block Cipher
Cycling Attacks on GCM, GHASH and Other Polynomial Macs and Hashes
An Improved Differential Attack on Full GOST - Extended Version, 17 December 2015∗
New Linear Attacks on Block Cipher GOST
Impossible Plaintext Cryptanalysis and Probable-Plaintext Collision Attacks of 64-Bit Block Cipher Modes
A Single-Key Attack on the Full GOST Block Cipher
Cryptanalysis of GOST R Hash Function
Security Evaluation of GOST 28147-89 in View of International Standardisation
Symmetric Cryptography
Practical Attacks on AES-Like Cryptographic Hash Functions
General Cryptography Part 1 of 2
Cipher Suites: Best Practices and Pitfalls
Bitslice Ciphers and Power Analysis Attacks
Nessie Proposal: NOEKEON
Cryptography in Industrial Embedded Systems: Our Experience of Needs and Constraints
Improved Generic Attacks Against Hash-Based Macs and HAIFA Itai Dinur, Gaëtan Leurent
Flexisec: a Configurable Link Layer Security Architecture for Wireless Sensor Networks
Analysis and Design of Authentication and Encryption Algorithms for Secure Cloud Systems
Cryptanalysis of the GOST Hash Function
Methods and Tools for Analysis of Symmetric Cryptographic Primitives
Gostcrypt User Guide
New Generic Attacks Against Hash-Based Macs
On Hash Functions Using Checksums
Cryptanalysis of the GOST Hash Function
Cryptanalysis of Some AES-Based Cryptographic Primitives
Password-Based Openssl Encryption Analysis of Key Derivation Protocol
Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
On Multiple Symmetric Fixed Points in GOST
Cryptographic Hash Functions: Cryptanalysis, Design and Applications
Botan Reference Guide Release 2.18.1
Cryptanalysis of the GOST Hash Function
Mathematical Monographs