CRUNCH

From The ECRYPT Hash Function Website

Jump to: navigation, search

1 The algorithm

  • Author(s): Louis Goubin, Mickael Ivascot, William Jalby, Olivier Ly, Valerie Nachef, Jacques Patarin, Joana Treger, Emmanuel Volte
  • Website: http://www.voltee.com/crunch/
  • NIST submission package: CRUNCH.zip


Louis Goubin, Mickael Ivascot, William Jalby, Olivier Ly, Valerie Nachef, Jacques Patarin, Joana Treger, Emmanuel Volte - CRUNCH
Submission to NIST, 2008
[Electronic Edition] [Bibtex]
Author : Louis Goubin, Mickael Ivascot, William Jalby, Olivier Ly, Valerie Nachef, Jacques Patarin, Joana Treger, Emmanuel Volte
Title : CRUNCH
In : Submission to NIST -


2 Cryptanalysis

Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference
length-extension hash all - - Çoban

A description of this table is given here.


Mustafa Çoban - Length-extension attack on CRUNCH
Available online, 2009
[Electronic Edition] [Bibtex]
Author : Mustafa Çoban
Title : Length-extension attack on CRUNCH
In : Available online -
Personal tools