“…Numerous recent works have tried to understand, evaluate, and improve the resistance of GOST against differential cryptanalysis, in view of the standardization of GOST [1,17,22]. At the same time, in 2011-2012, many improved differential attacks on GOST were found, allowing finally to break full 32-round GOST faster than by brute force, see [7,[9][10][11]. We also exploit these properties in this article.…”