The eHash Main Page

From The ECRYPT Hash Function Website

(Difference between revisions)
Jump to: navigation, search
(Generic Attacks on Hash Functions)
 
(19 intermediate revisions not shown)
Line 1: Line 1:
-
== List of Hash Functions ==
+
= Introduction =
-
On this page you can find a collection of existing hash functions.
+
An [[Introduction to Hash Functions|introduction]] to cryptographic hash functions.
-
[http://mediawiki.iaik.tugraz.at/index.php/HashFunctions Collection of Cryptographic Hash Functions]
 
-
== Notation and Definition ==
+
= The Hash Function Zoo =
-
== Generic Attacks on Hash Functions ==
+
The [[The Hash Function Zoo|Hash Function Zoo]] is a collection of peer-reviewed hash functions.
-
=== Birthday Attack & Generalized Birthday Attack ===
+
The [[The SHA-3 Zoo|SHA-3 Zoo]] contains functions submitted to the [http://www.nist.gov/hash-competition NIST Hash Competition]. We also collect [[SHA-3_Hardware_Implementations | hardware implementation results]] of the candidates.  
-
=== ... ===
+
-
== Some How Tos ==
+
= Generic Attacks on Hash Functions =
-
[http://mediawiki.iaik.tugraz.at/index.php/HowTo Some hints how to work with math environments and bibtex]
 
-
== Getting started ==
+
[[Generic_Attacks| Generic Attacks on Hash Functions]].
-
* [http://www.mediawiki.org/wiki/Help:FAQ MediaWiki FAQ]
+
[[GenericAttacksMerkleDamgaard| Generic Attacks on the Merkle-Damgaard Construction]].
-
* [http://mail.wikipedia.org/mailman/listinfo/mediawiki-announce MediaWiki release mailing list]
+
 
 +
 
 +
= Editors corner =
 +
 
 +
[[HowTo | How to]] work with math environments and BibTeX.
 +
 
 +
Mediawiki [http://www.mediawiki.org/wiki/Category:Help  help], [http://www.mediawiki.org/wiki/Help:FAQ FAQ], and release [http://mail.wikipedia.org/mailman/listinfo/mediawiki-announce mailing list].

Current revision as of 07:51, 12 March 2010

Contents

1 Introduction

An introduction to cryptographic hash functions.


2 The Hash Function Zoo

The Hash Function Zoo is a collection of peer-reviewed hash functions.

The SHA-3 Zoo contains functions submitted to the NIST Hash Competition. We also collect hardware implementation results of the candidates.

3 Generic Attacks on Hash Functions

Generic Attacks on Hash Functions.

Generic Attacks on the Merkle-Damgaard Construction.


4 Editors corner

How to work with math environments and BibTeX.

Mediawiki help, FAQ, and release mailing list.



ECRYPT is a Network of Excellence within the Information Societies Technology (IST) Programme of the European Commission. The information on this web site is provided as is, and no guarantee or warranty is given or implied that the information is fit for any particular purpose. The user thereof uses the information at his or her sole risk and liability.


Personal tools