Difference between revisions of "CHI"
From The ECRYPT Hash Function Website
(→The algorithm) |
|||
Line 3: | Line 3: | ||
* Author(s): Phil Hawkes, Cameron McDonald | * Author(s): Phil Hawkes, Cameron McDonald | ||
* Website: | * Website: | ||
− | * Specification: | + | * Specification: [http://ehash.iaik.tugraz.at/uploads/2/2c/Chi_submission.pdf local link] |
<bibtex> | <bibtex> | ||
Line 9: | Line 9: | ||
author = {Phil Hawkes and Cameron McDonald}, | author = {Phil Hawkes and Cameron McDonald}, | ||
title = {Submission to the SHA-3 Competition: The CHI Family of Cryptographic Hash Algorithms}, | title = {Submission to the SHA-3 Competition: The CHI Family of Cryptographic Hash Algorithms}, | ||
− | url = {}, | + | url = {http://ehash.iaik.tugraz.at/uploads/2/2c/Chi_submission.pdf}, |
howpublished = {Submission to NIST}, | howpublished = {Submission to NIST}, | ||
year = {2008}, | year = {2008}, |
Revision as of 13:45, 13 November 2008
1 The algorithm
- Author(s): Phil Hawkes, Cameron McDonald
- Website:
- Specification: local link
Phil Hawkes, Cameron McDonald - Submission to the SHA-3 Competition: The CHI Family of Cryptographic Hash Algorithms
- ,2008
- http://ehash.iaik.tugraz.at/uploads/2/2c/Chi_submission.pdf
BibtexAuthor : Phil Hawkes, Cameron McDonald
Title : Submission to the SHA-3 Competition: The CHI Family of Cryptographic Hash Algorithms
In : -
Address :
Date : 2008
2 Cryptanalysis
- None yet