much better and have high serious security margin.
Information here is aimed for software and protocol developers.
-There are example implementations of those algorithms on
-@url{http://www.cypherpunks.ru/pygost/, Python} and on
-@url{http://www.cypherpunks.ru/gogost/, Go}.
@multitable @columnfractions 0.5 0.5
@headitem Western algorithm @tab Russian analogue