Streebog
Top View
- Adapting Rigidity to Symmetric Cryptography: Towards “Unswerving” Designs∗
- Malicious Streebog
- Side-Channel Security Analysis and Protection of SHA-3
- Developments in Authenticated Encryption
- STRIBOB : Authenticated Encryption from GOST R 34.11-2012 LPS Or Whirlpool
- International Standard Iso/Iec 10118-3:2018(E)
- Differential Fault Analysis of Streebog
- Generation of 8-Bit S-Boxes Having Almost Optimal Cryptographic Properties Using Smaller 4-Bit S-Boxes and finite field Multiplication
- Second-Preimage Attack on New Russian Standardized Hash Function
- FIPS 140-2 Non-Proprietary Security Policy
- Classification of Cryptographic Libraries
- Numbers AES-GCM Efficiency, 154 0-RITT Data, 245 Internals, 152–153 2G Mobile Communications, 89 Security, 154 3DES (Triple DES), 59, 72–74
- Improved Generic Attacks Against Hash-Based Macs and HAIFA Itai Dinur, Gaëtan Leurent
- Design and Analysis of Cryptographic Algorithms
- Russian Style (Lack Of) Randomness
- Partitions in the S-Box of Streebog and Kuznyechik*
- Streebog Compression Function As PRF in Secret-Key Settings
- Second-Preimage Attack on New Russian Standardized Hash Function