Difference between revisions of "Blender"
From The ECRYPT Hash Function Website
Mlamberger (talk | contribs) m (→Cryptanalysis) |
Mlamberger (talk | contribs) m (→Cryptanalysis) |
||
Line 28: | Line 28: | ||
howpublished = {Available Online}, | howpublished = {Available Online}, | ||
abstract = {In this paper, we present a preimage attack on the hash function Blender for | abstract = {In this paper, we present a preimage attack on the hash function Blender for | ||
− | all output sizes. It has a complexity of about | + | all output sizes. It has a complexity of about n*2^(n/2) and negligible |
memory requirements. The attack is based on structural weaknesses in the design | memory requirements. The attack is based on structural weaknesses in the design | ||
of the hash function and is independent of the underlying compression function.}, | of the hash function and is independent of the underlying compression function.}, |
Revision as of 18:56, 20 December 2008
1 The algorithm
- Author(s): Colin Bradbury
- NIST submission package: Blender.zip
Colin Bradbury - BLENDER: A Proposed New Family of Cryptographic Hash Algorithms
- ,2008
- http://ehash.iaik.tugraz.at/uploads/5/5e/Blender.pdf
BibtexAuthor : Colin Bradbury
Title : BLENDER: A Proposed New Family of Cryptographic Hash Algorithms
In : -
Address :
Date : 2008
2 Cryptanalysis
Florian Mendel - Preimage Attack on Blender
- ,2008
- http://ehash.iaik.tugraz.at/uploads/4/48/Blender-preimage.pdf
BibtexAuthor : Florian Mendel
Title : Preimage Attack on Blender
In : -
Address :
Date : 2008
Vlastimil Klima - A near-collision attack on Blender-256
- ,2008
- http://cryptography.hyperlink.cz/BMW/near_collision_blender.pdf
BibtexAuthor : Vlastimil Klima
Title : A near-collision attack on Blender-256
In : -
Address :
Date : 2008
Liangyu Xu - Semi-free start collision attack on Blender