Lesamnta

From The ECRYPT Hash Function Website

Jump to: navigation, search

1 The algorithm


Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida - SHA-3 Proposal: Lesamnta
Submission to NIST, 2008
[Electronic Edition] [Bibtex]
Author : Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida
Title : SHA-3 Proposal: Lesamnta
In : Submission to NIST -

Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida - Security Analysis of the Compression Function of Lesamnta and its Impact
Official comment, 2009
[Electronic Edition] [Bibtex]
Author : Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida
Title : Security Analysis of the Compression Function of Lesamnta and its Impact
In : Official comment -

2 Cryptanalysis

Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference
pseudo-collision compression 256 full O(264) - Bouillaguet, Dunkelman, Leurent, Fouque

A description of this table is given here.


C. Bouillaguet, O. Dunkelman, G. Leurent, P. A. Fouque - Personal communication
Cited in Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida: "Security Analysis of the Compression Function of Lesamnta and its Impact", 2009
[Bibtex]
Author : C. Bouillaguet, O. Dunkelman, G. Leurent, P. A. Fouque
Title : Personal communication
In : Cited in Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida: "Security Analysis of the Compression Function of Lesamnta and its Impact" -
Personal tools