Abacus
From The ECRYPT Hash Function Website
Revision as of 21:32, 29 December 2008 by Mschlaeffer (talk | contribs)
1 The algorithm
- Author(s): Neil Sholer
- NIST submission package: Abacus.zip
Neil Sholer - Abacus: A Candidate for SHA-3
- ,2008
- http://ehash.iaik.tugraz.at/uploads/b/be/Abacus.pdf
BibtexAuthor : Neil Sholer
Title : Abacus: A Candidate for SHA-3
In : -
Address :
Date : 2008
2 Cryptanalysis
Type of Analysis | Hash Function Part | Hash Size (n) | Parameters/Variants | Compression Function Calls | Memory Requirements | Reference |
2nd preimage | hash | 2344 | - | Wilson | ||
collision | hash | 2172 | - | Wilson | ||
2nd preimage | hash | 2172 | - | Nikolić,Khovratovich |
A description of this table is given here.
David A. Wilson - Abacus: A second-preimage and collision attack
- ,2008
- http://web.mit.edu/dwilson/www/hash/abacus_attack.pdf
BibtexAuthor : David A. Wilson
Title : Abacus: A second-preimage and collision attack
In : -
Address :
Date : 2008
Ivica Nikolic, Dmitry Khovratovich - Second preimage attack on Abacus