Difference between revisions of "DHA-256"
From The ECRYPT Hash Function Website
(→Others) |
(→Others) |
||
Line 45: | Line 45: | ||
=== Others === | === Others === | ||
+ | <bibtex> | ||
@misc{cryptoeprint:2005:398, | @misc{cryptoeprint:2005:398, | ||
author = {IAIK Krypto Group}, | author = {IAIK Krypto Group}, | ||
Line 53: | Line 54: | ||
note = {\url{http://eprint.iacr.org/}}, | note = {\url{http://eprint.iacr.org/}}, | ||
} | } | ||
+ | </bibtex> |
Latest revision as of 12:34, 3 November 2008
Contents
1 Specification
- digest size: 256 bits
- max. message length: < 264 bits
- compression function: 512-bit message block, 256-bit chaining variable
Jesang Lee, Donghoon Chang, Hyun Kim, Eunjin Lee, Deukjo Hong - A New 256-bit Hash Function DHA-256 - Enhancing the Security of SHA-256
- ,2005
- http://csrc.nist.gov/groups/ST/hash/documents/ChangD_DHA256.pdf
BibtexAuthor : Jesang Lee, Donghoon Chang, Hyun Kim, Eunjin Lee, Deukjo Hong
Title : A New 256-bit Hash Function DHA-256 - Enhancing the Security of SHA-256
In : -
Address :
Date : 2005
2 Cryptanalysis
2.1 Best Known Results
2.2 Generic Attacks
2.3 Collision Attacks
2.4 Second Preimage Attacks
2.5 Preimage Attacks
2.6 Others
IAIK Krypto Group - Preliminary Analysis of DHA-256