EnRUPT

From The ECRYPT Hash Function Website

Jump to: navigation, search

1 The algorithm


Sean O'Neil, Karsten Nohl, Luca Henzen - EnRUPT Hash Function Specification
Submission to NIST, 2008
[Electronic Edition] [Bibtex]
Author : Sean O'Neil, Karsten Nohl, Luca Henzen
Title : EnRUPT Hash Function Specification
In : Submission to NIST -


2 Cryptanalysis

Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference
collision hash 256 example, 247 - Indesteege
preimage hash 512 2480 2480 Khovratovich,Nikolić

A description of this table is given here.


Sebastiaan Indesteege - Collisions for EnRUPT
Available online, 2008
[Electronic Edition] [Bibtex]
Author : Sebastiaan Indesteege
Title : Collisions for EnRUPT
In : Available online -

Dmitry Khovratovich, Ivica Nikolić - Cryptanalysis of EnRUPT
Available online, 2008
[Electronic Edition] [Bibtex]
Author : Dmitry Khovratovich, Ivica Nikolić
Title : Cryptanalysis of EnRUPT
In : Available online -
[Abstract]
Personal tools