{"id":"https://openalex.org/W2069896120","doi":"https://doi.org/10.1080/01611194.2011.632807","title":"Security Evaluation of GOST 28147-89 in View of International Standardisation","display_name":"Security Evaluation of GOST 28147-89 in View of International Standardisation","publication_year":2012,"publication_date":"2012-01-01","ids":{"openalex":"https://openalex.org/W2069896120","doi":"https://doi.org/10.1080/01611194.2011.632807","mag":"2069896120"},"language":"en","primary_location":{"id":"doi:10.1080/01611194.2011.632807","is_oa":false,"landing_page_url":"https://doi.org/10.1080/01611194.2011.632807","pdf_url":null,"source":{"id":"https://openalex.org/S185196701","display_name":"Cryptologia","issn_l":"0161-1194","issn":["0161-1194","1558-1586"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptologia","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085287860","display_name":"Nicolas T. Courtois","orcid":"https://orcid.org/0000-0003-0736-431X"},"institutions":[{"id":"https://openalex.org/I2800173700","display_name":"UCL Australia","ror":"https://ror.org/024atcf19","country_code":"AU","type":"education","lineage":["https://openalex.org/I2800173700"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Nicolas T. Courtois","raw_affiliation_strings":["Correspondencen.courtois@ucl.ac.uk","University college London"],"affiliations":[{"raw_affiliation_string":"Correspondencen.courtois@ucl.ac.uk","institution_ids":[]},{"raw_affiliation_string":"University college London","institution_ids":["https://openalex.org/I2800173700"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5085287860"],"corresponding_institution_ids":["https://openalex.org/I2800173700"],"apc_list":null,"apc_paid":null,"fwci":9.8474,"has_fulltext":false,"cited_by_count":44,"citation_normalized_percentile":{"value":0.98069717,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"36","issue":"1","first_page":"2","last_page":"13"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/gost","display_name":"GOST (hash function)","score":0.9736988544464111},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6919173002243042},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6789939403533936},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6747821569442749},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.5896859169006348},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.5879098176956177},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4707805812358856},{"id":"https://openalex.org/keywords/56-bit-encryption","display_name":"56-bit encryption","score":0.41855278611183167},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.17865270376205444}],"concepts":[{"id":"https://openalex.org/C2780233296","wikidata":"https://www.wikidata.org/wiki/Q3756229","display_name":"GOST (hash function)","level":2,"score":0.9736988544464111},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6919173002243042},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6789939403533936},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6747821569442749},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.5896859169006348},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.5879098176956177},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4707805812358856},{"id":"https://openalex.org/C46905813","wikidata":"https://www.wikidata.org/wiki/Q4640678","display_name":"56-bit encryption","level":4,"score":0.41855278611183167},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.17865270376205444}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1080/01611194.2011.632807","is_oa":false,"landing_page_url":"https://doi.org/10.1080/01611194.2011.632807","pdf_url":null,"source":{"id":"https://openalex.org/S185196701","display_name":"Cryptologia","issn_l":"0161-1194","issn":["0161-1194","1558-1586"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptologia","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","score":0.47999998927116394,"id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1699105","https://openalex.org/W19603449","https://openalex.org/W1490559148","https://openalex.org/W1503267625","https://openalex.org/W1524508699","https://openalex.org/W1542020576","https://openalex.org/W1546907539","https://openalex.org/W1570084506","https://openalex.org/W1587525026","https://openalex.org/W1595934196","https://openalex.org/W1759918341","https://openalex.org/W1778915605","https://openalex.org/W1870923733","https://openalex.org/W1913860316","https://openalex.org/W1983617130","https://openalex.org/W2038345254","https://openalex.org/W2048079788","https://openalex.org/W2059322341","https://openalex.org/W2109394932","https://openalex.org/W2121433919","https://openalex.org/W2124509406","https://openalex.org/W2163466490","https://openalex.org/W2206761661","https://openalex.org/W2398836113","https://openalex.org/W3031856220","https://openalex.org/W4255281402","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W3000297105","https://openalex.org/W1991257029","https://openalex.org/W2939330325","https://openalex.org/W4390599138","https://openalex.org/W1986421619","https://openalex.org/W4803226","https://openalex.org/W1849484603","https://openalex.org/W3089223619","https://openalex.org/W4288849478","https://openalex.org/W2940752727"],"abstract_inverted_index":{"Abstract":[0],"GOST":[1,27,59,78,105,116,357],"28147-89":[2],"is":[3,10,28,40,44,106,121,219,232,326,373],"a":[4,11,22,67,122,228,241,327,338],"well-known":[5],"256-bit":[6],"block":[7],"cipher":[8],"that":[9,77,115,148,227],"plausible":[12],"alternative":[13],"for":[14,245,321],"AES-256":[15],"and":[16,37,39,43,53,120,160,190,239,285,354],"triple":[17],"DES,":[18],"which,":[19],"however,":[20],"has":[21],"much":[23,157],"lower":[24],"implementation":[25],"cost.":[26],"implemented":[29],"in":[30,92,100,131,201,302,375],"standard":[31,231],"crypto":[32],"libraries,":[33],"such":[34,278,323,370],"as":[35,279],"OpenSSL":[36],"Crypto++,":[38],"increasingly":[41],"popular":[42],"used":[45],"also":[46,183,256],"outside":[47],"of":[48,51,185,191,249,261,316,341,356,369],"its":[49],"country":[50],"origin":[52],"on":[54,153,270,275,344],"the":[55,101,146,164,173,210,258,290,303,314,376],"Internet.":[56],"In":[57,136],"2010,":[58],"was":[60,86,112,128],"submitted":[61],"to":[62,65,144,169,220,237,312,337],"ISO":[63,211],"18033":[64],"become":[66,310],"worldwide":[68],"industrial":[69],"encryption":[70,230],"standard.":[71],"Until":[72],"2011,":[73,361],"researchers":[74],"unanimously":[75],"agreed":[76],"could":[79,295],"or":[80],"should":[81],"be":[82,118,199,297],"very":[83],"secure,":[84],"which":[85,155,172,325],"summarized":[87],"at":[88,133,363],"CHES":[89],"2010":[90],"conference":[91],"these":[93],"words:":[94],"\u201cdespite":[95],"considerable":[96],"cryptanalytic":[97],"efforts":[98],"spent":[99],"past":[102],"20":[103],"years,":[104],"still":[107],"not":[108],"broken.\u201d":[109],"Unhappily,":[110],"it":[111,309],"recently":[113],"discovered":[114],"can":[117],"broken":[119],"deeply":[123],"flawed":[124],"cipher.":[125],"One":[126,367],"attack":[127,143,175,372],"already":[129,272],"presented":[130],"February":[132],"FSE":[134,177],"2011.":[135],"this":[137],"short":[138],"paper,":[139],"we":[140,207,293],"describe":[141],"another":[142],"illustrate":[145],"fact":[147],"there":[149],"are":[150,182],"now":[151],"attacks":[152,189,274,292,343],"GOST,":[154,345],"require":[156,163],"less":[158],"memory,":[159],"don't":[161],"even":[162,194],"so":[165,250],"called":[166,251],"\u2018reflection":[167],"property\u2019":[168],"hold,":[170],"without":[171],"recent":[174,305],"from":[176],"2011":[178],"wouldn't":[179],"work.":[180],"We":[181,234,255],"aware":[184],"many":[186,271,322],"substantially":[187],"faster":[188],"some":[192],"special,":[193],"weaker,":[195],"cases.":[196],"These":[197],"will":[198],"published":[200],"appropriate":[202,318],"peer-reviewed":[203],"cryptography":[204],"conferences":[205],"but":[206,289],"must":[208],"warn":[209],"committees":[212],"right":[213],"now.":[214],"More":[215],"generally,":[216],"our":[217],"ambition":[218],"do":[221],"more":[222],"than":[223],"just":[224],"point":[225],"out":[226],"major":[229],"flawed.":[233],"would":[235],"like":[236],"present":[238,377],"suggest":[240],"new":[242,267,342],"general":[243],"paradigm":[244,268],"effective":[246],"symmetric":[247,276],"cryptanalysis":[248],"\u201cAlgebraic":[252],"Complexity":[253,264,352],"Reduction.\u201d":[254,265],"explain":[257],"precise":[259],"concept":[260],"\u201cBlack-box":[262],"Algebraic":[263,351],"This":[266,334],"builds":[269],"known":[273],"ciphers,":[277],"fixed":[280],"point,":[281],"slide,":[282],"involution,":[283],"cycling,":[284],"other":[286],"self-similarity":[287],"attacks,":[288,324],"exact":[291],"obtain":[294],"never":[296],"developed":[298],"previously,":[299],"because":[300],"only":[301],"most":[304],"5":[306],"years":[307],"did":[308],"possible":[311],"show":[313],"existence":[315],"an":[317,371],"last":[319],"step":[320],"low":[328],"data":[329],"complexity":[330],"software":[331],"algebraic":[332],"attack.":[333],"methodology":[335],"leads":[336],"large":[339],"number":[340],"cf.":[346],"[12":[347],"Courtois":[348],",":[349],"N.":[350],"Reduction":[353],"Cryptanalysis":[355],".":[358],"Preprint,":[359],"November":[360],"Available":[362],"http://eprint.iacr.org/2011/626":[364],"[Google":[365],"Scholar]].":[366],"example":[368],"given":[374],"paper.":[378]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":8},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":5},{"year":2012,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
