Difference between revisions of "Cheetah"

From The ECRYPT Hash Function Website
 
m
Line 6: Line 6:
 
-->
 
-->
 
* NIST submission package: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/Cheetah.zip .zip]
 
* NIST submission package: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/Cheetah.zip .zip]
 +
  
 
<bibtex>
 
<bibtex>
Line 11: Line 12:
 
   author    = {Dmitry Khovratovich, Alex Biryukov, Ivica Nikolic},
 
   author    = {Dmitry Khovratovich, Alex Biryukov, Ivica Nikolic},
 
   title    = {The Hash Function Cheetah: Specification and Supporting Documentation},
 
   title    = {The Hash Function Cheetah: Specification and Supporting Documentation},
   url        = {},
+
   url        = {http://ehash.iaik.tugraz.at/uploads/c/ca/Cheetah.pdf},
 
   howpublished = {Submission to NIST},
 
   howpublished = {Submission to NIST},
 
   year      = {2008},
 
   year      = {2008},

Revision as of 13:39, 11 December 2008

1 The algorithm

  • Author(s): Dmitry Khovratovich, Alex Biryukov, Ivica Nikolic
  • NIST submission package: .zip


Dmitry Khovratovich, Alex Biryukov, Ivica Nikolic - The Hash Function Cheetah: Specification and Supporting Documentation

,2008
http://ehash.iaik.tugraz.at/uploads/c/ca/Cheetah.pdf
Bibtex
Author : Dmitry Khovratovich, Alex Biryukov, Ivica Nikolic
Title : The Hash Function Cheetah: Specification and Supporting Documentation
In : -
Address :
Date : 2008

2 Cryptanalysis

  • None yet