DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Streebog
Streebog
State of the Art in Lightweight Symmetric Cryptography
Exponential S-Boxes: a Link Between the S-Boxes of Belt and Kuznyechik/Streebog
Streebog and Kuznyechik Inconsistencies in the Claims of Their Designers
Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain
Improved Generic Attacks Against Hash-Based Macs and HAIFA⋆
FIPS 140-2 Non-Proprietary Security Policy
SPHINCS $^+ $ Post-Quantum Digital Signature Scheme with Streebog
General Classification of the Authenticated Encryption Schemes
Improved Generic Attacks Against Hash-Based Macs and HAIFA
Simple AEAD Hardware Interface (SÆHI) in a Soc: Implementing an On-Chip Keyak/Whirlbob Coprocessor
Stribobr2: “WHIRLBOB”
Reverse-Engineering the S-Box of Streebog, Kuznyechik and Stribobr1 (Full Version)⋆
Arxiv:2001.00515V1 [Cs.CR] 2 Jan 2020 – Use of Backdoor Techniques, Whether Software Or Hardware, Equipment Trapping Or Bugging [8,16,17,20]
Cryptographic Hash Function
Cryptanalysis of Streebog, the New Russian Hash Function Standard
Statistical Testing of Blockchain Hash Algorithms
Algebraic Fault Analysis of SHA-3
Cryptanalysis of Some Block Cipher Constructions
Top View
Adapting Rigidity to Symmetric Cryptography: Towards “Unswerving” Designs∗
Malicious Streebog
Side-Channel Security Analysis and Protection of SHA-3
Developments in Authenticated Encryption
STRIBOB : Authenticated Encryption from GOST R 34.11-2012 LPS Or Whirlpool
International Standard Iso/Iec 10118-3:2018(E)
Differential Fault Analysis of Streebog
Generation of 8-Bit S-Boxes Having Almost Optimal Cryptographic Properties Using Smaller 4-Bit S-Boxes and finite field Multiplication
Second-Preimage Attack on New Russian Standardized Hash Function
FIPS 140-2 Non-Proprietary Security Policy
Classification of Cryptographic Libraries
Numbers AES-GCM Efficiency, 154 0-RITT Data, 245 Internals, 152–153 2G Mobile Communications, 89 Security, 154 3DES (Triple DES), 59, 72–74
Improved Generic Attacks Against Hash-Based Macs and HAIFA Itai Dinur, Gaëtan Leurent
Design and Analysis of Cryptographic Algorithms
Russian Style (Lack Of) Randomness
Partitions in the S-Box of Streebog and Kuznyechik*
Streebog Compression Function As PRF in Secret-Key Settings
Second-Preimage Attack on New Russian Standardized Hash Function
Cryptanalysis of Some AES-Based Cryptographic Primitives
Іssn 0485-8972 Радиотехника. 2019. Вып. 198 54 Удк 004.056.5 Doi
Authenticated Encryption from GOST R 34.11-2012 LPS Permutation (Extended Abstract)
Botan Reference Guide Release 2.18.1
Generic Attacks Against MAC Algorithms
Nettle Manual for the Nettle Library Version 3.4