MCSSHA-3

From The ECRYPT Hash Function Website

Jump to: navigation, search

1 The algorithm


Mikhail Maslennikov - SECURE HASH ALGORITHM MCSSHA-3
Submission to NIST, 2008
[Electronic Edition] [Bibtex]
Author : Mikhail Maslennikov
Title : SECURE HASH ALGORITHM MCSSHA-3
In : Submission to NIST -


2 Cryptanalysis

Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference
2nd preimage hash all 23n/8 - Aumasson,Naya-Plasencia
2nd preimage hash 256,512 MCSSHA-4 22n/3 - Aumasson,Naya-Plasencia
2nd preimage hash 256,512 MCSSHA-5 22n/3 - Aumasson,Naya-Plasencia

A description of this table is given here.


Jean-Philippe Aumasson, María Naya-Plasencia - Cryptanalysis of the MCSSHA Hash Functions
OFFICIAL COMMENT, 2009
[Electronic Edition] [Bibtex]
Author : Jean-Philippe Aumasson, María Naya-Plasencia
Title : Cryptanalysis of the MCSSHA Hash Functions
In : OFFICIAL COMMENT -


2.1 Archive

Jean-Philippe Aumasson, María Naya-Plasencia - Second preimages on MCSSHA-3
Available online, 2008
[Electronic Edition] [Bibtex]
Author : Jean-Philippe Aumasson, María Naya-Plasencia
Title : Second preimages on MCSSHA-3
In : Available online -
[Abstract]
Personal tools