2 @section Kuznechik (GOST R 34.12-2015)
12 Substitution-permutation network (SPN)
16 @url{https://tools.ietf.org/html/rfc7801.html, 7801}
18 Complexity 2@sup{140.3}, 2@sup{153.3} memory, 2@sup{113} data for 5 rounds
20 @url{https://en.wikipedia.org/wiki/Kuznyechik, article}
25 @item Feistel network is used during key schedule.
26 @item Defined S-boxes was not created pseudorandomly, but with reverse
27 engineered @url{https://eprint.iacr.org/2016/071.pdf, algorithm}.
28 However there is no proof that it reduces cipher's strength.
29 @item Standard's document also defines @ref{en2814789, Magma} cipher.
32 @strong{Implementations}: @ref{34122015Impl, here}.