Difference between revisions of "Cheetah"
From The ECRYPT Hash Function Website
Mlamberger (talk | contribs) |
m |
||
Line 6: | Line 6: | ||
--> | --> | ||
* NIST submission package: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/Cheetah.zip .zip] | * NIST submission package: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/Cheetah.zip .zip] | ||
+ | |||
<bibtex> | <bibtex> | ||
Line 11: | Line 12: | ||
author = {Dmitry Khovratovich, Alex Biryukov, Ivica Nikolic}, | author = {Dmitry Khovratovich, Alex Biryukov, Ivica Nikolic}, | ||
title = {The Hash Function Cheetah: Specification and Supporting Documentation}, | title = {The Hash Function Cheetah: Specification and Supporting Documentation}, | ||
− | url = {}, | + | url = {http://ehash.iaik.tugraz.at/uploads/c/ca/Cheetah.pdf}, |
howpublished = {Submission to NIST}, | howpublished = {Submission to NIST}, | ||
year = {2008}, | year = {2008}, |
Revision as of 13:39, 11 December 2008
1 The algorithm
- Author(s): Dmitry Khovratovich, Alex Biryukov, Ivica Nikolic
- NIST submission package: .zip
Dmitry Khovratovich, Alex Biryukov, Ivica Nikolic - The Hash Function Cheetah: Specification and Supporting Documentation
- ,2008
- http://ehash.iaik.tugraz.at/uploads/c/ca/Cheetah.pdf
BibtexAuthor : Dmitry Khovratovich, Alex Biryukov, Ivica Nikolic
Title : The Hash Function Cheetah: Specification and Supporting Documentation
In : -
Address :
Date : 2008
2 Cryptanalysis
- None yet