GOST

From The ECRYPT Hash Function Website
Revision as of 15:00, 10 March 2008 by Tnad (talk | contribs) (General)

1 Specification

2 Cryptanalysis

2.1 Best Known Results


2.2 Generic Attacks


2.3 Collision Attacks


2.4 Second Preimage Attacks


2.5 Preimage Attacks


2.6 Others

3 Performance Evaluation / Implementation (HW and SW)