Difference between revisions of "Abacus"
From The ECRYPT Hash Function Website
Mschlaeffer (talk | contribs) m (→Cryptanalysis) |
Mschlaeffer (talk | contribs) m (→Cryptanalysis) |
||
(One intermediate revision by the same user not shown) | |||
Line 20: | Line 20: | ||
== Cryptanalysis == | == Cryptanalysis == | ||
− | |||
{| border="1" cellpadding="4" cellspacing="0" class="wikitable" style="text-align:center" | {| border="1" cellpadding="4" cellspacing="0" class="wikitable" style="text-align:center" |
Latest revision as of 21:46, 29 December 2008
1 The algorithm
- Author(s): Neil Sholer
- NIST submission package: Abacus.zip
Neil Sholer - Abacus: A Candidate for SHA-3
- ,2008
- http://ehash.iaik.tugraz.at/uploads/b/be/Abacus.pdf
BibtexAuthor : Neil Sholer
Title : Abacus: A Candidate for SHA-3
In : -
Address :
Date : 2008
2 Cryptanalysis
Type of Analysis | Hash Function Part | Hash Size (n) | Parameters/Variants | Compression Function Calls | Memory Requirements | Reference |
2nd preimage | hash | 2344 | - | Wilson | ||
collision | hash | 2172 | - | Wilson | ||
2nd preimage | hash | 2172 | - | Nikolić,Khovratovich |
A description of this table is given here.
David A. Wilson - Abacus: A second-preimage and collision attack
- ,2008
- http://web.mit.edu/dwilson/www/hash/abacus_attack.pdf
BibtexAuthor : David A. Wilson
Title : Abacus: A second-preimage and collision attack
In : -
Address :
Date : 2008
Ivica Nikolic, Dmitry Khovratovich - Second preimage attack on Abacus