WHIRLBOB, the Whirlpool Based Variant of STRIBOB

[1]  Markku-Juhani O. Saarinen STRIBOB: Authenticated Encryption from GOST R 34.11-2012 LPS Permutation , 2015, IACR Cryptol. ePrint Arch..

[2]  Vincent Rijmen,et al.  The Rebound Attack and Subspace Distinguishers: Application to Whirlpool , 2015, Journal of Cryptology.

[3]  Atul Luykx,et al.  Beyond 2c/2 Security in Sponge-Based Authenticated Encryption Modes , 2014, IACR Cryptol. ePrint Arch..

[4]  Markku-Juhani O. Saarinen Simple AEAD Hardware Interface (SÆHI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor , 2014, TrustED '14.

[5]  Guido Bertoni,et al.  Sakura: A Flexible Coding for Tree Hashing , 2014, ACNS.

[6]  Markku-Juhani O. Saarinen Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation , 2014, CT-RSA.

[7]  Benedikt Heinz,et al.  A Cache Timing Attack on AES in Virtualization Environments , 2012, Financial Cryptography.

[8]  Andrey Bogdanov,et al.  Biclique Cryptanalysis of the Full AES , 2011, ASIACRYPT.

[9]  Michael A. Peck,et al.  Suite B Profile for Internet Protocol Security (IPsec) , 2011, RFC.

[10]  Guido Bertoni,et al.  Duplexing the sponge: single-pass authenticated encryption and other applications , 2011, IACR Cryptol. ePrint Arch..

[11]  Kevin M. Igoe Suite B Cryptographic Suites for Secure Shell (SSH) , 2011, RFC.

[12]  Billy Bob Brumley,et al.  Secure and Fast Implementations of Two Involution Ciphers , 2010, NordSec.

[13]  Guido Bertoni,et al.  Sponge-Based Pseudo-Random Number Generators , 2010, CHES.

[14]  Vincent Rijmen,et al.  Rebound Distinguishers: Results on the Full Whirlpool Compression Function , 2009, ASIACRYPT.

[15]  Alex Biryukov,et al.  Related-Key Cryptanalysis of the Full AES-192 and AES-256 , 2009, ASIACRYPT.

[16]  Michael Hamburg,et al.  Accelerating AES with Vector Permute Instructions , 2009, CHES.

[17]  Alex Biryukov,et al.  Distinguisher and Related-Key Attack on the Full AES-256 , 2009, CRYPTO.

[18]  Florian Mendel,et al.  The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl , 2009, FSE.

[19]  Russ Housley,et al.  Suite B Profile for Transport Layer Security (TLS) , 2009, RFC.

[20]  Ruby B. Lee,et al.  Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation , 2008, FSE.

[21]  Morris Dworkin,et al.  Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC , 2007 .

[22]  Onur Aciiçmez,et al.  Cache Based Remote Timing Attack on the AES , 2007, CT-RSA.

[23]  Adi Shamir,et al.  Cache Attacks and Countermeasures: The Case of AES , 2006, CT-RSA.

[24]  Russ Housley,et al.  Counter with CBC-MAC (CCM) , 2003, RFC.

[25]  Elaine B. Barker,et al.  The Keyed-Hash Message Authentication Code (HMAC) | NIST , 2002 .

[26]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[27]  Pieter Retief Kasselman,et al.  Analysis and design of cryptographic hash functions , 1999 .

[28]  Lars R. Knudsen,et al.  The Interpolation Attack on Block Ciphers , 1997, FSE.

[29]  Vincent Rijmen,et al.  The Cipher SHARK , 1996, FSE.

[30]  Kaisa Nyberg,et al.  Differentially Uniform Mappings for Cryptography , 1994, EUROCRYPT.

[31]  Mitsuru Matsui,et al.  Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.

[32]  М.-Ю О Сааринен,et al.  StriBob: аутентифицированное шифрование с помощью подстановки LPS из ГОСТ Р 34.11-2012 , 2015 .

[33]  Alex Biryukov,et al.  The Secret Structure of the S-Box of Streebog, Kuznechik and Stribob , 2015, IACR Cryptol. ePrint Arch..

[34]  G. B. Marshalko,et al.  О новом российском стандарте шифрования , 2015 .

[35]  Oleksandr Kazymyrov,et al.  Algebraic Aspects of the Russian Hash Standard GOST R 34.11-2012 , 2013, IACR Cryptol. ePrint Arch..

[36]  Nicolas Courtois,et al.  How Fast can be Algebraic Attacks on Block Ciphers ? , 2006, IACR Cryptol. ePrint Arch..

[37]  Vincent Rijmen,et al.  The WHIRLPOOL Hashing Function , 2003 .

[38]  Vincent Rijmen,et al.  The Design of Rijndael , 2002, Information Security and Cryptography.

[39]  Eli Biham,et al.  Differential Cryptanalysis of the Data Encryption Standard , 1993, Springer New York.

[40]  S Miyaguchi,et al.  128ビットHash関数(N‐Hash) , 1990 .