{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T14:24:06Z","timestamp":1743085446448,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319186801"},{"type":"electronic","value":"9783319186818"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-18681-8_22","type":"book-chapter","created":{"date-parts":[[2015,5,6]],"date-time":"2015-05-06T13:17:19Z","timestamp":1430918239000},"page":"274-286","source":"Crossref","is-referenced-by-count":5,"title":["Impossible Differential Properties of Reduced Round Streebog"],"prefix":"10.1007","author":[{"given":"Ahmed","family":"Abdelkhalek","sequence":"first","affiliation":[]},{"given":"Riham","family":"AlTawy","sequence":"additional","affiliation":[]},{"given":"Amr M.","family":"Youssef","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"ISO\/IEC 9797-1. Information technology-security techniques-data integrity mechanism using a cryptographic check function employing a block cipher algorithm. international organizatoin for standards"},{"key":"22_CR2","unstructured":"The National Hash Standard of the Russian Federation GOST R 34.11-2012. Russian Federal Agency on Technical Regulation and Metrology report (2012), \n                        https:\/\/www.tc26.ru\/en\/GOSTR34112012\/GOST_R_34_112012_eng.pdf"},{"key":"22_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-319-12160-4_11","volume-title":"Information Security and Cryptology \u2013 ICISC 2013","author":"R. AlTawy","year":"2014","unstructured":"AlTawy, R., Kircanski, A., Youssef, A.M.: Rebound attacks on stribog. In: Lee, H.-S., Han, D.-G. (eds.) ICISC 2013. LNCS, vol.\u00a08565, pp. 175\u2013188. Springer, Heidelberg (2014)"},{"issue":"8","key":"22_CR4","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1016\/j.ipl.2014.03.005","volume":"114","author":"R. Altawy","year":"2014","unstructured":"Altawy, R., Youssef, A.M.: Integral distinguishers for reduced-round Stribog. Information Processing Letters\u00a0114(8), 426\u2013431 (2014)","journal-title":"Information Processing Letters"},{"key":"22_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-319-06734-6_7","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2014","author":"R. AlTawy","year":"2014","unstructured":"AlTawy, R., Youssef, A.M.: Preimage Attacks on Reduced-Round Stribog. In: Pointcheval, D., Vergnaud, D. (eds.) AFRICACRYPT. LNCS, vol.\u00a08469, pp. 109\u2013125. Springer, Heidelberg (2014)"},{"key":"22_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-319-17533-1_3","volume-title":"Information Security Practice and Experience","author":"R. AlTawy","year":"2015","unstructured":"AlTawy, R., Youssef, A.M.: Differential Fault Analysis of Streebog. In: Lopez, J., Wu, Y. (eds.) Information Security Practice and Experience. LNCS, vol.\u00a09065, pp. 35\u201349. Springer, Heidelberg (2015)"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Altawy, R., Youssef, A.M.: Watch your Constants: Malicious Streebog. IET Information Security (2015) (to appear)","DOI":"10.1049\/iet-ifs.2014.0540"},{"key":"22_CR8","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"M. Bellare","year":"1996","unstructured":"Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 1\u201315. Springer, Heidelberg (1996)"},{"key":"22_CR9","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Keccak sponge function family main document. Submission to NIST (Round 2) 3 (2009)"},{"key":"22_CR10","unstructured":"Biham, E., Keller, N.: Cryptanalysis of reduced variants of Rijndael. In: 3rd AES Conference, New York, USA (2000)"},{"key":"22_CR11","unstructured":"Bouillaguet, C., Dunkelman, O., Leurent, G., Fouque, P.-A.: Attacks on hash functions based on generalized feistel - application to reduced-round Lesamnta and SHAvite-3512. Cryptology ePrint Archive, Report 2009\/634 (2009), \n                        http:\/\/eprint.iacr.org\/2009\/634.pdf\n                      ."},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Chang, S.-J., Perlner, R., Burr, W.E., Turan, M.S., Kelsey, J.M., Paul, S., Bassham, L.E.: Third-round report of the SHA-3 cryptographic hash algorithm competition. Citeseer (2012)","DOI":"10.6028\/NIST.IR.7896"},{"key":"22_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11502760_1","volume-title":"Fast Software Encryption","author":"J. Daemen","year":"2005","unstructured":"Daemen, J., Rijmen, V.: A New MAC Construction ALRED and a Specific Instance ALPHA-MAC. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol.\u00a03557, pp. 1\u201317. Springer, Heidelberg (2005)"},{"key":"22_CR14","unstructured":"Daemen, J., Rijmen, V.: The Pelican MAC function. Cryptology ePrint Archive, Report 2005\/088 (2005), \n                        http:\/\/eprint.iacr.org\/2005\/088.pdf"},{"key":"22_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-662-44371-2_9","volume-title":"Advances in Cryptology \u2013 CRYPTO 2014","author":"I. Dinur","year":"2014","unstructured":"Dinur, I., Leurent, G.: Improved Generic Attacks against Hash-Based MACs and HAIFA. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014, Part I. LNCS, vol.\u00a08616, pp. 149\u2013168. Springer, Heidelberg (2014)"},{"key":"22_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-540-74143-5_2","volume-title":"Advances in Cryptology - CRYPTO 2007","author":"P.-A. Fouque","year":"2007","unstructured":"Fouque, P.-A., Leurent, G., Nguyen, P.Q.: Full Key-Recovery Attacks on HMAC\/NMAC-MD4 and NMAC-MD5. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol.\u00a04622, pp. 13\u201330. Springer, Heidelberg (2007)"},{"key":"22_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-319-13051-4_12","volume-title":"Selected Areas in Cryptography \u2013 SAC 2014","author":"J. Guo","year":"2014","unstructured":"Guo, J., Jean, J., Leurent, G., Peyrin, T., Wang, L.: The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function. In: Joux, A., Youssef, A. (eds.) SAC 2014. LNCS, vol.\u00a08781, pp. 195\u2013211. Springer, Heidelberg (2014)"},{"key":"22_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-540-85174-5_9","volume-title":"Advances in Cryptology \u2013 CRYPTO 2008","author":"H. Handschuh","year":"2008","unstructured":"Handschuh, H., Preneel, B.: Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol.\u00a05157, pp. 144\u2013161. Springer, Heidelberg (2008)"},{"key":"22_CR19","unstructured":"Kazymyrov, O., Kazymyrova, V.: Algebraic aspects of the russian hash standard GOST R 34.11-2012. In: CTCrypt, pp. 160\u2013176 (2013), \n                        http:\/\/eprint.iacr.org\/2013\/556"},{"key":"22_CR20","unstructured":"Keccak team. \u201cStrengths of Keccak - Design and security\u201d, \n                        http:\/\/keccak.noekeon.org\/\n                       (last accessed February 20, 2014)"},{"key":"22_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1007\/978-3-642-11925-5_23","volume-title":"Topics in Cryptology - CT-RSA 2010","author":"G. Leurent","year":"2010","unstructured":"Leurent, G.: Practical key recovery attack against secret-IV edon-$\\mathcal R$. In: Pieprzyk, J. (ed.) CT-RSA 2010. LNCS, vol.\u00a05985, pp. 334\u2013349. Springer, Heidelberg (2010)"},{"key":"22_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/978-3-319-07536-5_18","volume-title":"Applied Cryptography and Network Security","author":"B. Ma","year":"2014","unstructured":"Ma, B., Li, B., Hao, R., Li, X.: Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function. In: Boureanu, I., Owesarski, P., Vaudenay, S. (eds.) ACNS 2014. LNCS, vol.\u00a08479, pp. 289\u2013307. Springer, Heidelberg (2014)"},{"key":"22_CR23","doi-asserted-by":"crossref","first-page":"71","DOI":"10.4213\/mvk68","volume":"3","author":"D. Matyukhin","year":"2012","unstructured":"Matyukhin, D., Shishkin, V.: Some methods of hash functions analysis with application to the GOST P 34.11-94 algorithm. Mat. Vopr. Kriptogr\u00a03, 71\u201389 (2012)","journal-title":"Mat. Vopr. Kriptogr"},{"key":"22_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-540-71039-4_14","volume-title":"Fast Software Encryption","author":"F. Mendel","year":"2008","unstructured":"Mendel, F., Pramstaller, N., Rechberger, C.: A (Second) Preimage Attack on the GOST Hash Function. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol.\u00a05086, pp. 224\u2013234. Springer, Heidelberg (2008)"},{"key":"22_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/978-3-540-85174-5_10","volume-title":"Advances in Cryptology \u2013 CRYPTO 2008","author":"F. Mendel","year":"2008","unstructured":"Mendel, F., Pramstaller, N., Rechberger, C., Kontak, M., Szmidt, J.: Cryptanalysis of the GOST Hash Function. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol.\u00a05157, pp. 162\u2013178. Springer, Heidelberg (2008)"},{"issue":"1","key":"22_CR26","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1109\/18.746787","volume":"45","author":"B. Preneel","year":"1999","unstructured":"Preneel, B., van Oorschot, P.C.: On the security of iterated message authentication codes. IEEE Transactions on Information Theory\u00a045(1), 188\u2013199 (1999)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"12","key":"22_CR27","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1016\/j.ipl.2014.07.007","volume":"114","author":"Z. Wang","year":"2014","unstructured":"Wang, Z., Yu, H., Wang, X.: Cryptanalysis of GOST R hash function. Information Processing Letters\u00a0114(12), 655\u2013662 (2014)","journal-title":"Information Processing Letters"},{"key":"22_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/978-3-319-12087-4_20","volume-title":"Information Security and Cryptology","author":"J. Zou","year":"2014","unstructured":"Zou, J., Wu, W., Wu, S.: Cryptanalysis of the Round-Reduced GOST Hash Function. In: Lin, D., Xu, S., Yung, M. (eds.) Inscrypt 2013. LNCS, vol.\u00a08567, pp. 307\u2013320. Springer, Heidelberg (2014)"}],"container-title":["Lecture Notes in Computer Science","Codes, Cryptology, and Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-18681-8_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T08:19:15Z","timestamp":1676017155000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-18681-8_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319186801","9783319186818"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-18681-8_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}