О криптографических свойствах алгоритмов, сопутствующих применению стандартов ГОСТ Р 34.11-2012 и ГОСТ Р 34.10-2012
From MaRDI portal
Publication:5152410
DOI10.4213/mvk172zbMath1475.94094OpenAlexW2791247452MaRDI QIDQ5152410
Stanislav V. Smyshlyaev, Vladimir O. Popov, Evgeny K. Alekseev, Igor' B. Oshkin
Publication date: 20 September 2021
Published in: Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography] (Search for Journal in Brave)
Full work available at URL: http://mathnet.ru/eng/mvk172
pseudorandom sequence generatorsmessage authenticationcryptographic algorithmskey generation algorithms
Related Items (2)
Keyed Streebog is a secure PRF and MAC ⋮ On the security properties of Russian standardized elliptic curves
Uses Software
Cites Work
- Unnamed Item
- An efficient protocol for authenticated key agreement
- Another look at HMAC
- Provable security of digital signatures in the tamper-proof device model
- A cryptanalytic time-memory trade-off
- Reducing elliptic curve logarithms to logarithms in a finite field
- Foundations of Cryptography
- Foundations of Cryptography
- Another Look at Security Theorems for 1-Key Nested MACs
- Advances in Cryptology - EUROCRYPT 2004
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
This page was built for publication: О криптографических свойствах алгоритмов, сопутствующих применению стандартов ГОСТ Р 34.11-2012 и ГОСТ Р 34.10-2012