Blender

From The ECRYPT Hash Function Website

Jump to: navigation, search

1 The algorithm

  • Author(s): Colin Bradbury
  • NIST submission package: Blender.zip


Colin Bradbury - BLENDER: A Proposed New Family of Cryptographic Hash Algorithms
Submission to NIST, 2008
[Electronic Edition] [Bibtex]
Author : Colin Bradbury
Title : BLENDER: A Proposed New Family of Cryptographic Hash Algorithms
In : Submission to NIST -


2 Cryptanalysis

Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference
preimage hash all 10*2n/4 - Klima
collision hash all 10*2n/4 - Klima
preimage hash all n*2(n+w)/2 - Newbold
preimage hash all n*2n/2 - Mendel
near-collision hash all example - Klima
semi-free start collision hash all example - Xu

A description of this table is given here.


Vlastimil Klima - Huge Multicollisions and Multipreimages of Hash Functions BLENDER-n
Cryptology ePrint Archive, Report 2009/006, 2009
[Bibtex]
Author : Vlastimil Klima
Title : Huge Multicollisions and Multipreimages of Hash Functions BLENDER-n
In : Cryptology ePrint Archive, Report 2009/006 -
[Abstract]

Craig Newbold - Observations and Attacks On The SHA-3 Candidate Blender
Available online, 2008
[Electronic Edition] [Bibtex]
Author : Craig Newbold
Title : Observations and Attacks On The SHA-3 Candidate Blender
In : Available online -
[Abstract]

Florian Mendel - Preimage Attack on Blender
Available Online, 2008
[Electronic Edition] [Bibtex]
Author : Florian Mendel
Title : Preimage Attack on Blender
In : Available Online -
[Abstract]

Vlastimil Klima - A near-collision attack on Blender-256
Available online, 2008
[Electronic Edition] [Bibtex]
Author : Vlastimil Klima
Title : A near-collision attack on Blender-256
In : Available online -

Liangyu Xu - Semi-free start collision attack on Blender
Available online, 2008
[Electronic Edition] [Bibtex]
Author : Liangyu Xu
Title : Semi-free start collision attack on Blender
In : Available online -
[Abstract]
Personal tools