Difference between revisions of "DCH"

From The ECRYPT Hash Function Website
m (Fixed BibTeX key)
(Cryptanalysis)
Line 33: Line 33:
 
   author    = {Dmitry  Khovratovich and Ivica Nikolić},
 
   author    = {Dmitry  Khovratovich and Ivica Nikolić},
 
   title    = {Cryptanalysis of DCH-n},
 
   title    = {Cryptanalysis of DCH-n},
   url        = {http://lj.streamclub.ru/papers/hash/dch.pdf},
+
   url        = {http://ehash.iaik.tugraz.at/uploads/b/b7/Dch1.pdf},
 
   howpublished = {Available online},
 
   howpublished = {Available online},
 
   abstract  = {We present collision and preimage attacks on DCH-n. The attacks exploit a design weakness of the underlying compression function. Both attacks require 2^45 computations and memory.},
 
   abstract  = {We present collision and preimage attacks on DCH-n. The attacks exploit a design weakness of the underlying compression function. Both attacks require 2^45 computations and memory.},

Revision as of 12:51, 1 December 2008