CHI

From The ECRYPT Hash Function Website

Jump to: navigation, search

1 The algorithm


Phil Hawkes, Cameron McDonald - Submission to the SHA-3 Competition: The CHI Family of Cryptographic Hash Algorithms
Submission to NIST, 2008
[Electronic Edition] [Bibtex]
Author : Phil Hawkes, Cameron McDonald
Title : Submission to the SHA-3 Competition: The CHI Family of Cryptographic Hash Algorithms
In : Submission to NIST -


2 Cryptanalysis

Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference
pseudo-2nd preimage hash 224/256 1 - Aumasson,Bjørstad,Meier,Mendel

A description of this table is given here.


Jean-Philippe Aumasson, Tor E. Bjørstad, Willi Meier, Florian Mendel - Observation on the PRE-MIXING step of CHI-256 and CHI-224
OFFICIAL COMMENT, 2009
[Electronic Edition] [Bibtex]
Author : Jean-Philippe Aumasson, Tor E. Bjørstad, Willi Meier, Florian Mendel
Title : Observation on the PRE-MIXING step of CHI-256 and CHI-224
In : OFFICIAL COMMENT -
Personal tools