Difference between revisions of "HAS-V"
From The ECRYPT Hash Function Website
Npramstaller (talk | contribs) |
Npramstaller (talk | contribs) (→Specification) |
||
Line 5: | Line 5: | ||
* max. message length: < 2<sup>64</sup> bits | * max. message length: < 2<sup>64</sup> bits | ||
* compression function: 512-bit message block, 160-bit chaining variable | * compression function: 512-bit message block, 160-bit chaining variable | ||
− | * Specification: | + | * Specification: |
+ | <bibtex> | ||
+ | @inproceedings{sacryptParkHL00, | ||
+ | author = {Nan Kyoung Park and Joon Ho Hwang and Pil Joong Lee}, | ||
+ | title = {HAS-V: A New Hash Function with Variable Output Length}, | ||
+ | booktitle = {Selected Areas in Cryptography}, | ||
+ | year = {2000}, | ||
+ | pages = {202-216}, | ||
+ | url = {http://link.springer.de/link/service/series/0558/bibs/2012/20120202.htm}, | ||
+ | editor = {Douglas R. Stinson and Stafford E. Tavares}, | ||
+ | publisher = {Springer}, | ||
+ | series = {LNCS}, | ||
+ | volume = {2012}, | ||
+ | isbn = {3-540-42069-X}, | ||
+ | abstract = {Hash functions play an essential role in many areas of cryptographic applications such as digital signature, authentication, and key derivation. In this paper, we propose a new hash function with variable output length, namely HAS-V, to meet the needs of various security levels desired among different applications. A great deal of attention was paid to balance the characteristics of security and performance. The use of message expansion, 4-variable Boolean functions, variable and fixed amounts of shifts, and interrelated parallel lines provide a high level of security for HAS-V. Experiments show that HAS-V is about 19% faster than SHA-1, 31% faster than RIPEMD-160, and 26% faster than HAVAL on a Pentium PC.}, | ||
+ | } | ||
+ | </bibtex> | ||
--> | --> | ||