{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:21:14Z","timestamp":1740172874900,"version":"3.37.3"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,5,15]],"date-time":"2023-05-15T00:00:00Z","timestamp":1684108800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,5,15]],"date-time":"2023-05-15T00:00:00Z","timestamp":1684108800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100012190","name":"Ministry of Science and Higher Education of the Russian Federation","doi-asserted-by":"publisher","award":["FSWU-2023-0031"],"award-info":[{"award-number":["FSWU-2023-0031"]}],"id":[{"id":"10.13039\/501100012190","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"DOI":"10.1007\/s11416-023-00481-2","type":"journal-article","created":{"date-parts":[[2023,5,15]],"date-time":"2023-05-15T17:02:53Z","timestamp":1684170173000},"page":"277-293","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Historical notes on Russian cryptography"],"prefix":"10.1007","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7681-0382","authenticated-orcid":false,"given":"Anna","family":"Epishkina","sequence":"first","affiliation":[]},{"given":"Sergey","family":"Zapechnikov","sequence":"additional","affiliation":[]},{"given":"Anna","family":"Belozubova","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,15]]},"reference":[{"key":"481_CR1","first-page":"736","volume-title":"History of Information Protection in Russia","author":"AV Babash","year":"2012","unstructured":"Babash, A.V., Baranova, E.K., Larin, D.A.: History of Information Protection in Russia, p. 736. Publisher Center EAOI, Moscow (2012). (in Russian)"},{"key":"481_CR2","first-page":"384","volume-title":"Cryptographic Service of Russia. Essays on History","author":"DA Larin","year":"2017","unstructured":"Larin, D.A.: Cryptographic Service of Russia. Essays on History, p. 384. Helios-ARV, Moscow (2017). (in Russian)"},{"key":"481_CR3","first-page":"254","volume-title":"Historical Evidence of the Beginning and Development of Russian Cryptography (XVI\u2013XVII Centuries)","author":"V Nikonov","year":"2016","unstructured":"Nikonov, V., Stolpakov, B.: Historical Evidence of the Beginning and Development of Russian Cryptography (XVI\u2013XVII Centuries), p. 254. Media Group \u201cAvangard,\u201d Moscow (2016)"},{"issue":"18","key":"481_CR4","doi-asserted-by":"publisher","first-page":"82","DOI":"10.17223\/20710410\/18\/7","volume":"4","author":"NN Tokareva","year":"2012","unstructured":"Tokareva, N.N.: On the history of cryptography in Russia. Prikl. Diskretn. Mat. 4(18), 82\u2013107 (2012). (in Russian)","journal-title":"Prikl. Diskretn. Mat."},{"key":"481_CR5","unstructured":"Babash, A.V., et al.: On the development of cryptography in the XIX century. In: Information Protection, No. 5 (2003) (in Russian)"},{"key":"481_CR6","unstructured":"Astrakhan, V.I., Gusev, V.V.: Formation and development of government communications in Russia, 1996 (in Russian)"},{"key":"481_CR7","doi-asserted-by":"publisher","unstructured":"Zapechnikov, S., Tolstoy, A., Nagibin, S.: History of cryptography in syllabus on information security training. In: IFIP Advances in Information and Communication Technology, vol. 453, pp. 146\u2013157 (2015). https:\/\/doi.org\/10.1007\/978-3-319-18500-2_13","DOI":"10.1007\/978-3-319-18500-2_13"},{"key":"481_CR8","first-page":"511","volume-title":"The History of Encryption in Russia","author":"TA Soboleva","year":"2002","unstructured":"Soboleva, T.A.: The History of Encryption in Russia, p. 511. Olma-Press-Obrazovaniye, Moscow (2002). (in Russian)"},{"key":"481_CR9","volume-title":"The Secret Writing in the South Slavic and Russian Monuments of Writing","author":"MN Speransky","year":"2011","unstructured":"Speransky, M.N.: The Secret Writing in the South Slavic and Russian Monuments of Writing, 2nd edn. Book House \u201cLibrocom,\u201d Moscow (2011). (in Russian)","edition":"2"},{"key":"481_CR10","doi-asserted-by":"crossref","unstructured":"Shchepkin, V.N., Nauka, M.: Russian paleography, p. 225 (1967) (in Russian)","DOI":"10.1007\/978-1-4899-6860-9_16"},{"key":"481_CR11","unstructured":"Shamin, S.M.: Unknown cryptographic alphabet from the archive of the order of secret affairs. Ancient Russia. In: Questions of Medieval Studies, no. 2 (40), pp. 103\u2013106 (2010) (in Russian)"},{"issue":"2","key":"481_CR12","first-page":"116","volume":"18","author":"S Zapechnikov","year":"2011","unstructured":"Zapechnikov, S.: From the history of cryptography: cryptography as a phenomenon of the Ancient Russian literary language (XII\u2013XVII centuries). Inf. Technol. Secur. 18(2), 116\u2013123 (2011). (in Russian)","journal-title":"Inf. Technol. Secur."},{"issue":"2","key":"481_CR13","first-page":"49","volume":"19","author":"S Zapechnikov","year":"2012","unstructured":"Zapechnikov, S.: From the history of cryptography: document protection, cryptography and secret communications in Byzantium (IV\u2013XV centuries). Inf. Technol. Secur. 19(2), 49\u201361 (2012). (in Russian)","journal-title":"Inf. Technol. Secur."},{"issue":"94","key":"481_CR14","first-page":"29","volume":"14","author":"S Zapechnikov","year":"2012","unstructured":"Zapechnikov, S.: From the history of cryptography: Leonhard Euler\u2019s contribution to the formation of the mathematical foundations of modern cryptology. Bull. Russian State Univ. Ser. Doc. Arch. Stud. Comput. Sci. Inf. Prot. Inf. Secur. 14(94), 29\u201352 (2012). (in Russian)","journal-title":"Bull. Russian State Univ. Ser. Doc. Arch. Stud. Comput. Sci. Inf. Prot. Inf. Secur."},{"key":"481_CR15","unstructured":"Nikonov, V., Stolpakov, B.: Historical evidence of the beginning and development of Russian cryptography (XVI\u2013XVII centuries) (2016)"},{"issue":"18","key":"481_CR16","doi-asserted-by":"publisher","first-page":"82","DOI":"10.17223\/20710410\/18\/7","volume":"4","author":"NN Tokareva","year":"2012","unstructured":"Tokareva, N.N.: On the history of cryptography in Russia. Prikl. Diskretn. Mat. 4(18), 82\u2013107 (2012)","journal-title":"Prikl. Diskretn. Mat."},{"key":"481_CR17","unstructured":"Babash, A.V., Baranova, E.K., Larin, D.A.: History of information protection in Russia (2012) (in Russian)"},{"key":"481_CR18","unstructured":"Soboleva, T.A.: The history of encryption in Russia (2002) (in Russian)"},{"key":"481_CR19","unstructured":"Larin, D.A.: Cryptographic service of Russia. In: Essays on History (2017) (in Russian)"},{"key":"481_CR20","volume-title":"The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet","author":"D Kahn","year":"1996","unstructured":"Kahn, D.: The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet. Simon and Schuster, New York (1996)"},{"key":"481_CR21","unstructured":"The encryption business of the Soviet Union. Part 1. Military Review (2018)"},{"key":"481_CR22","unstructured":"Babash, A.V., et al.: On the development of cryptography in the XIX century. Information Protection, No. 5, 2003."},{"key":"481_CR23","unstructured":"Astrakhan, V.I., Gusev, V.V.: Formation and development of government communications in Russia (1996)"},{"key":"481_CR24","unstructured":"Encryption machines of the USSR 1931\u20131991. (Review) 18.11.2020 (Section 9). Prisma. The army and the military-industrial complex. http:\/\/prizmablog.ru\/"},{"key":"481_CR25","volume-title":"Applied Cryptography. Protocols, Algorithms, and Source Code in C","author":"B Schneier","year":"2015","unstructured":"Schneier, B.: Applied Cryptography. Protocols, Algorithms, and Source Code in C. Wiley, London (2015)"},{"key":"481_CR26","doi-asserted-by":"publisher","unstructured":"Poschmann, A., Ling, S., Wang, H.: 256 bit standardized crypto for 650 GE\u2014GOST revisited. In: Mangard, S., Standaert, FX. (eds.) Cryptographic Hardware and Embedded Systems, CHES 2010. CHES 2010. Lecture Notes in Computer Science, vol. 6225. Springer, Berlin (2010). https:\/\/doi.org\/10.1007\/978-3-642-15031-9_15","DOI":"10.1007\/978-3-642-15031-9_15"},{"key":"481_CR27","unstructured":"Courtois, N.T.: Security evaluation of GOST 28147-89 in view of international standardisation. Cryptology ePrint Archive, Report 2011\/211 (2011). http:\/\/eprint.iacr.org\/"},{"key":"481_CR28","doi-asserted-by":"publisher","unstructured":"Dinur, I., Dunkelman, O., Shamir, A.: Improved attacks on full GOST. In: Canteaut, A. (eds.) Fast Software Encryption. FSE 2012. Lecture Notes in Computer Science, vol. 7549. Springer, Berlin (2012). https:\/\/doi.org\/10.1007\/978-3-642-34047-5_2","DOI":"10.1007\/978-3-642-34047-5_2"},{"key":"481_CR29","first-page":"166","volume":"8","author":"AA Moldovyan","year":"1998","unstructured":"Moldovyan, A.A., Moldovyan, N.A.: Flexible algorithms for information security in automated control systems. Autom. Telemech. 8, 166\u2013176 (1998). (in Russian)","journal-title":"Autom. Telemech."},{"key":"481_CR30","unstructured":"Gut, N.D., Moldovyan, A.A., Moldovyan, N.A.: Flexible hardware-oriented ciphers based on controlled adders. In: Rroceedings of RusCrypto-1999 (1999)"},{"key":"481_CR31","unstructured":"Moldovyan, A.A., Moldovyan, N.A. High-speed ciphers of a new generation. In: Rroceedings of RusCrypto-1999 (1999) (in Russian)"},{"key":"481_CR32","unstructured":"Alekseev, L.A., Alekseev, L.E.: Transformation of information in the SPECTRUM-Z system. In: Proceedings of RusCrypto-1999 (1999) (in Russian)"},{"key":"481_CR33","unstructured":"Volchkov, A., De-Monderik, N.Y., Lebedev, A.N.: Algorithm WICKER-98. In: Proceedings of RusCrypto-1999 (1999) (in Russian)"},{"key":"481_CR34","unstructured":"Abdrakhmanov, R.G., Zhukov, A.E.: Substitution-permutation ciphers. In: Proceedings of RusCrypto-2000 (2000) (in Russian). https:\/\/www.ruscrypto.ru\/accociation\/archive\/rc2000.html"},{"key":"481_CR35","unstructured":"GOST R 34.12-2015: Information technology. In: Cryptographic Data Protection. Block Ciphers (2015) (in Russian)"},{"key":"481_CR36","unstructured":"GOST R 34.13-2015: Information technology. In: Cryptographic Data Security. Block Ciphers Operation Modes (2015) (in Russian)"},{"key":"481_CR37","unstructured":"Komarova, A.V., Menschikov, A.A., Korobeinikov, A.G.: Analisys abd comparison of digital signature algorithms GOST R 34.10-94, GOST R 34.10-2012. In: Cybersecurity Questions, No. 1(19) (2017) (in Russian)"},{"key":"481_CR38","unstructured":"GOST R 34.10-2012: Information technology. cryptographic data security. generation and verification processes of electronic digital signature (2012) (in Russian)"},{"key":"481_CR39","unstructured":"GOST R 34.11-2012: Information technology. Cryptographic data security. Hash-function (2013) (in Russian)"},{"key":"481_CR40","unstructured":"Stolbunov, A., Rostovtcev, A.: New cryptosystems against quantum attacks. In: Proceedings of Science Week (2004) (in Russian)"},{"key":"481_CR41","unstructured":"Stolbunov, A., Rostovtcev, A.: Public-key cryptosystem based on isogenies. In: IACR Cryptology ePrint Archive (2006) (in Russian)"},{"key":"481_CR42","unstructured":"Sukhinin, B.M.: Development and research of high-speed generators of pseudorandom uniformly distributed binary sequences based on cellular automata: dissertation ... candidate of Technical Sciences: 05.13.19\u2014Moscow, 2011, p. 224. Russian State Library, 61 11\u20135\/3554 (in Russian)"},{"issue":"2","key":"481_CR43","first-page":"47","volume":"5","author":"AA Dmukh","year":"2014","unstructured":"Dmukh, A.A., Dygin, D.M., Marshalko, G.B.: A lightweight-friendly modification of GOST block cipher. Math. Asp. Cryptogr. 5(2), 47\u201355 (2014)","journal-title":"Math. Asp. Cryptogr."}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00481-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-023-00481-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00481-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T18:12:16Z","timestamp":1713463936000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-023-00481-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,15]]},"references-count":43,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2024,6]]}},"alternative-id":["481"],"URL":"https:\/\/doi.org\/10.1007\/s11416-023-00481-2","relation":{},"ISSN":["2263-8733"],"issn-type":[{"type":"electronic","value":"2263-8733"}],"subject":[],"published":{"date-parts":[[2023,5,15]]},"assertion":[{"value":"3 October 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 April 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 May 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors declare that they have no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}