Difference between revisions of "ECHO"
From The ECRYPT Hash Function Website
m (link to website added) |
m (Fixed BibTeX author field) |
||
Line 8: | Line 8: | ||
<bibtex> | <bibtex> | ||
@misc{sha3BBG+08, | @misc{sha3BBG+08, | ||
− | author = {Ryad Benadjila | + | author = {Ryad Benadjila and Olivier Billet and Henri Gilbert and Gilles Macario-Rat and Thomas Peyrin and Matt Robshaw and Yannick Seurin}, |
title = {SHA-3 Proposal: ECHO}, | title = {SHA-3 Proposal: ECHO}, | ||
url = {http://ehash.iaik.tugraz.at/uploads/9/91/Echo.pdf}, | url = {http://ehash.iaik.tugraz.at/uploads/9/91/Echo.pdf}, |
Revision as of 17:55, 25 March 2009
1 The algorithm
- Author(s): Ryad Benadjila, Olivier Billet, Henri Gilbert, Gilles Macario-Rat, Thomas Peyrin, Matt Robshaw, Yannick Seurin
- Website: http://crypto.rd.francetelecom.com/echo/
- NIST submission package: ECHO.zip
Ryad Benadjila, Olivier Billet, Henri Gilbert, Gilles Macario-Rat, Thomas Peyrin, Matt Robshaw, Yannick Seurin - SHA-3 Proposal: ECHO
- ,2008
- http://ehash.iaik.tugraz.at/uploads/9/91/Echo.pdf
BibtexAuthor : Ryad Benadjila, Olivier Billet, Henri Gilbert, Gilles Macario-Rat, Thomas Peyrin, Matt Robshaw, Yannick Seurin
Title : SHA-3 Proposal: ECHO
In : -
Address :
Date : 2008
2 Cryptanalysis
- None yet