DOCSLIB.ORG
  • Sign Up
  • Log In
  • Upload
  • Sign Up
  • Log In
  • Upload
  • Home
  • »  Tags
  • »  Streebog

Streebog

  • State of the Art in Lightweight Symmetric Cryptography

    State of the Art in Lightweight Symmetric Cryptography

  • Exponential S-Boxes: a Link Between the S-Boxes of Belt and Kuznyechik/Streebog

    Exponential S-Boxes: a Link Between the S-Boxes of Belt and Kuznyechik/Streebog

  • Streebog and Kuznyechik Inconsistencies in the Claims of Their Designers

    Streebog and Kuznyechik Inconsistencies in the Claims of Their Designers

  • Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain

    Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain

  • Improved Generic Attacks Against Hash-Based Macs and HAIFA⋆

    Improved Generic Attacks Against Hash-Based Macs and HAIFA⋆

  • FIPS 140-2 Non-Proprietary Security Policy

    FIPS 140-2 Non-Proprietary Security Policy

  • SPHINCS $^+ $ Post-Quantum Digital Signature Scheme with Streebog

    SPHINCS $^+ $ Post-Quantum Digital Signature Scheme with Streebog

  • General Classification of the Authenticated Encryption Schemes

    General Classification of the Authenticated Encryption Schemes

  • Improved Generic Attacks Against Hash-Based Macs and HAIFA

    Improved Generic Attacks Against Hash-Based Macs and HAIFA

  • Simple AEAD Hardware Interface (SÆHI) in a Soc: Implementing an On-Chip Keyak/Whirlbob Coprocessor

    Simple AEAD Hardware Interface (SÆHI) in a Soc: Implementing an On-Chip Keyak/Whirlbob Coprocessor

  • Stribobr2: “WHIRLBOB”

    Stribobr2: “WHIRLBOB”

  • Reverse-Engineering the S-Box of Streebog, Kuznyechik and Stribobr1 (Full Version)⋆

    Reverse-Engineering the S-Box of Streebog, Kuznyechik and Stribobr1 (Full Version)⋆

  • Arxiv:2001.00515V1 [Cs.CR] 2 Jan 2020 – Use of Backdoor Techniques, Whether Software Or Hardware, Equipment Trapping Or Bugging [8,16,17,20]

    Arxiv:2001.00515V1 [Cs.CR] 2 Jan 2020 – Use of Backdoor Techniques, Whether Software Or Hardware, Equipment Trapping Or Bugging [8,16,17,20]

  • Cryptographic Hash Function

    Cryptographic Hash Function

  • Cryptanalysis of Streebog, the New Russian Hash Function Standard

    Cryptanalysis of Streebog, the New Russian Hash Function Standard

  • Statistical Testing of Blockchain Hash Algorithms

    Statistical Testing of Blockchain Hash Algorithms

  • Algebraic Fault Analysis of SHA-3

    Algebraic Fault Analysis of SHA-3

  • Cryptanalysis of Some Block Cipher Constructions

    Cryptanalysis of Some Block Cipher Constructions

Top View
  • Adapting Rigidity to Symmetric Cryptography: Towards “Unswerving” Designs∗
  • Malicious Streebog
  • Side-Channel Security Analysis and Protection of SHA-3
  • Developments in Authenticated Encryption
  • STRIBOB : Authenticated Encryption from GOST R 34.11-2012 LPS Or Whirlpool
  • International Standard Iso/Iec 10118-3:2018(E)
  • Differential Fault Analysis of Streebog
  • Generation of 8-Bit S-Boxes Having Almost Optimal Cryptographic Properties Using Smaller 4-Bit S-Boxes and finite field Multiplication
  • Second-Preimage Attack on New Russian Standardized Hash Function
  • FIPS 140-2 Non-Proprietary Security Policy
  • Classification of Cryptographic Libraries
  • Numbers AES-GCM Efficiency, 154 0-RITT Data, 245 Internals, 152–153 2G Mobile Communications, 89 Security, 154 3DES (Triple DES), 59, 72–74
  • Improved Generic Attacks Against Hash-Based Macs and HAIFA Itai Dinur, Gaëtan Leurent
  • Design and Analysis of Cryptographic Algorithms
  • Russian Style (Lack Of) Randomness
  • Partitions in the S-Box of Streebog and Kuznyechik*
  • Streebog Compression Function As PRF in Secret-Key Settings
  • Second-Preimage Attack on New Russian Standardized Hash Function


© 2024 Docslib.org    Feedback