Difference between revisions of "CHI"

From The ECRYPT Hash Function Website
(The algorithm)
Line 3: Line 3:
 
* Author(s): Phil Hawkes, Cameron McDonald
 
* Author(s): Phil Hawkes, Cameron McDonald
 
* Website:  
 
* Website:  
* Specification:  
+
* Specification: [http://ehash.iaik.tugraz.at/uploads/2/2c/Chi_submission.pdf local link]
  
 
<bibtex>
 
<bibtex>
Line 9: Line 9:
 
   author    = {Phil Hawkes and Cameron McDonald},
 
   author    = {Phil Hawkes and Cameron McDonald},
 
   title    = {Submission to the SHA-3 Competition: The CHI Family of Cryptographic Hash Algorithms},
 
   title    = {Submission to the SHA-3 Competition: The CHI Family of Cryptographic Hash Algorithms},
   url        = {},
+
   url        = {http://ehash.iaik.tugraz.at/uploads/2/2c/Chi_submission.pdf},
 
   howpublished = {Submission to NIST},
 
   howpublished = {Submission to NIST},
 
   year      = {2008},
 
   year      = {2008},

Revision as of 13:45, 13 November 2008

1 The algorithm

  • Author(s): Phil Hawkes, Cameron McDonald
  • Website:
  • Specification: local link

Phil Hawkes, Cameron McDonald - Submission to the SHA-3 Competition: The CHI Family of Cryptographic Hash Algorithms

,2008
http://ehash.iaik.tugraz.at/uploads/2/2c/Chi_submission.pdf
Bibtex
Author : Phil Hawkes, Cameron McDonald
Title : Submission to the SHA-3 Competition: The CHI Family of Cryptographic Hash Algorithms
In : -
Address :
Date : 2008

2 Cryptanalysis

  • None yet