Difference between revisions of "Abacus"

From The ECRYPT Hash Function Website
(Added two cryptanalytic results on Abacus)
m (Cryptanalysis)
Line 30: Line 30:
 
  howpublished = {available online},
 
  howpublished = {available online},
 
  year = {2008},
 
  year = {2008},
 +
abstract = {A technique for controlling parts of the internal state of the Abacus hash function is described. This technique leads to a second-preimage attack of complexity 2^344 operations and a collision attack of approximately 2^172 operations.},
 
}
 
}
 
</bibtex>
 
</bibtex>
Line 40: Line 41:
 
  howpublished = {available online},
 
  howpublished = {available online},
 
  year = {2008},
 
  year = {2008},
 +
abstract = {We present a second preimage attack on Abacus. The attack requires 2^172 computations and negligible memory for all digests.},
 
}
 
}
 
</bibtex>
 
</bibtex>

Revision as of 10:03, 15 December 2008