On the S-Box of GOST Streebog and Kuznyechik
The algorithms that are used are usually those that have been standardized by some standardizing body (e.g. the American NIST, ISO/IEC, etc.). This trust comes from the analysis received by these algorithms before they were standardized and from the quality of the theoretical frameworks used to construct them, frameworks which were carefully explained by their designers. The AES, SHA-3 and the DUAL_ EC algorithms were all standardized by the same institution (the NIST), meaning that assessing the quality of a standard is therefore not as simple as looking at its origin.
Source: who.paris.inria.fr