Difference between revisions of "Abacus"
From The ECRYPT Hash Function Website
Crechberger (talk | contribs) (Added two cryptanalytic results on Abacus) |
m (→Cryptanalysis) |
||
Line 30: | Line 30: | ||
howpublished = {available online}, | howpublished = {available online}, | ||
year = {2008}, | year = {2008}, | ||
+ | abstract = {A technique for controlling parts of the internal state of the Abacus hash function is described. This technique leads to a second-preimage attack of complexity 2^344 operations and a collision attack of approximately 2^172 operations.}, | ||
} | } | ||
</bibtex> | </bibtex> | ||
Line 40: | Line 41: | ||
howpublished = {available online}, | howpublished = {available online}, | ||
year = {2008}, | year = {2008}, | ||
+ | abstract = {We present a second preimage attack on Abacus. The attack requires 2^172 computations and negligible memory for all digests.}, | ||
} | } | ||
</bibtex> | </bibtex> |
Revision as of 10:03, 15 December 2008
1 The algorithm
- Author(s): Neil Sholer
- NIST submission package: Abacus.zip
Neil Sholer - Abacus: A Candidate for SHA-3
- ,2008
- http://ehash.iaik.tugraz.at/uploads/b/be/Abacus.pdf
BibtexAuthor : Neil Sholer
Title : Abacus: A Candidate for SHA-3
In : -
Address :
Date : 2008
2 Cryptanalysis
David A. Wilson - Abacus: A second-preimage and collision attack
- ,2008
- http://web.mit.edu/dwilson/www/hash/abacus_attack.pdf
BibtexAuthor : David A. Wilson
Title : Abacus: A second-preimage and collision attack
In : -
Address :
Date : 2008
Ivica Nikolic, Dmitry Khovratovich - Second preimage attack on Abacus