Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography]
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Impact factor
Guidelines for authors

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Mat. Vopr. Kriptogr.:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography], 2012, Volume 3, Issue 4, Pages 71–89
DOI: https://doi.org/10.4213/mvk68
(Mi mvk68)
 

This article is cited in 5 scientific papers (total in 5 papers)

Some methods of hash functions analysis with application to the GOST P 34.11-94 algorithm

D. V. Matyukhina, V. A. Shishkin

a Russian Technical Committee for Standardization (TC 26), Moscow
Full-text PDF (188 kB) Citations (5)
References:
Abstract: A class of hash functions with a special finalization round (containing the GOST R 34.11-94 hash function) is considered. For functions from this class we propose a new multicollision attack and show that by means of Wagner's method it is possible to construct a description of a large number of different collisions. For GOST R 34.11-94 hash function we propose a modification of the known collision attack using smaller amount of memory. We obtain lower estimate for the amount of memory permitting the modified attack to be faster than generic ones.
Key words: hash function, collision, multicollision, GOST R 34.11-94, Wagner's method.
Received 20.V.2011
Document Type: Article
UDC: 519.719.2+519.248:[004+007+654]
Language: Russian
Citation: D. V. Matyukhin, V. A. Shishkin, “Some methods of hash functions analysis with application to the GOST P 34.11-94 algorithm”, Mat. Vopr. Kriptogr., 3:4 (2012), 71–89
Citation in format AMSBIB
\Bibitem{MatShi12}
\by D.~V.~Matyukhin, V.~A.~Shishkin
\paper Some methods of hash functions analysis with application to the GOST P~34.11-94 algorithm
\jour Mat. Vopr. Kriptogr.
\yr 2012
\vol 3
\issue 4
\pages 71--89
\mathnet{http://mi.mathnet.ru/mvk68}
\crossref{https://doi.org/10.4213/mvk68}
Linking options:
  • https://www.mathnet.ru/eng/mvk68
  • https://doi.org/10.4213/mvk68
  • https://www.mathnet.ru/eng/mvk/v3/i4/p71
  • This publication is cited in the following 5 articles:
    1. V. V. Gusev, “Legal messages for the GOST R 34.13-2015 block cipher modes”, Mat. Vopr. Kriptogr., 10:3 (2019), 33–47  mathnet  mathnet  crossref
    2. V. V. Gusev, “Legal messages for some message authentication functions in block ciphers”, Mat. Vopr. Kriptogr., 9:1 (2018), 27–46  mathnet  mathnet  crossref
    3. A. Abdelkhalek, R. AlTawy, A. M. Youssef, “Impossible differential properties of reduced round Streebog”, Codes, Cryptology, and Information Security, C2Si 2015, Lecture Notes in Computer Science, 9084, eds. ElHajji S., Nitaj A., Carlet C., Souidi E., Springer-Verlag, Berlin, 2015, 274–286  crossref  mathscinet  zmath  isi  scopus
    4. R. AlTawy, A. Kircanski, A. M. Youssef, “Rebound attacks on Stribog”, Information Security and Cryptology - ICISC 2013, Lecture Notes in Computer Science, 8565, 2014, 175–188  crossref  mathscinet  zmath  isi  scopus
    5. R. AlTawy, A. M. Youssef, “Preimage attacks on reduced-round Stribog”, Progress in Cryptology - AFRICACRYPT 2014, Lecture Notes in Computer Science, 8469, 2014, 109–125  crossref  zmath  isi  scopus
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Математические вопросы криптографии
    Statistics & downloads:
    Abstract page:1263
    Full-text PDF :1233
    References:101
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2025