DCH

From The ECRYPT Hash Function Website

Revision as of 20:04, 29 December 2008 by Mschlaeffer (Talk | contribs)
(diff) ← Older revision | Current revision (diff) | Newer revision → (diff)
Jump to: navigation, search

1 The algorithm


David A. Wilson - The DCH Hash Function
Submission to NIST, 2008
[Electronic Edition] [Bibtex]
Author : David A. Wilson
Title : The DCH Hash Function
In : Submission to NIST -


2 Cryptanalysis

Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference
collision hash all 521 - Mendel,Lamberger
preimage hash all 521 - Mendel,Lamberger
collision hash all 245 245 Khovratovich,Nikolić
preimage hash all 245 245 Khovratovich,Nikolić
2nd preimage hash 512 2450  ? Rechberger

A description of this table is given here.


Mario Lamberger, Florian Mendel - Practical Collision and Preimage Attack on DCH-n
Available online, 2008
[Electronic Edition] [Bibtex]
Author : Mario Lamberger, Florian Mendel
Title : Practical Collision and Preimage Attack on DCH-n
In : Available online -
[Abstract]

Dmitry Khovratovich, Ivica Nikolić - Cryptanalysis of DCH-n
Available online, 2008
[Electronic Edition] [Bibtex]
Author : Dmitry Khovratovich, Ivica Nikolić
Title : Cryptanalysis of DCH-n
In : Available online -
[Abstract]

Christian Rechberger - Personal communication (second preimage attack)
Reported online, 2008
[Electronic Edition] [Bibtex]
Author : Christian Rechberger
Title : Personal communication (second preimage attack)
In : Reported online -
Personal tools