Difference between revisions of "Hamsi"
From The ECRYPT Hash Function Website
Mschlaeffer (talk | contribs) (analy) |
Mschlaeffer (talk | contribs) (analysis updated) |
||
Line 27: | Line 27: | ||
|- | |- | ||
| | near-collision || compression function || 224, 256 || 3 rounds || 2<sup>21</sup> || || [http://rump2009.cr.yp.to/936779b3afb9b48a404b487d6865091d.pdf Nikolic] | | | near-collision || compression function || 224, 256 || 3 rounds || 2<sup>21</sup> || || [http://rump2009.cr.yp.to/936779b3afb9b48a404b487d6865091d.pdf Nikolic] | ||
+ | |- | ||
+ | | | non-randomness || compression function || 224, 256 || 6 rounds || 2<sup>27</sup> || || [http://www.131002.net/data/papers/AM09.pdf Aumasson,Meier] | ||
+ | |- | ||
+ | | | non-randomness || compression function || 224, 256 || 12 rounds || 2<sup>729</sup> || || [http://www.131002.net/data/papers/AM09.pdf Aumasson,Meier] | ||
|- | |- | ||
|} | |} | ||
Line 48: | Line 52: | ||
url = {http://rump2009.cr.yp.to/936779b3afb9b48a404b487d6865091d.pdf}, | url = {http://rump2009.cr.yp.to/936779b3afb9b48a404b487d6865091d.pdf}, | ||
howpublished = {CRYPTO rump session} | howpublished = {CRYPTO rump session} | ||
+ | year = {2009}, | ||
+ | </bibtex> | ||
+ | |||
+ | <bibtex> | ||
+ | @misc{hamsiAM9, | ||
+ | author = {Jean-Philippe Aumasson and Willi Meier}, | ||
+ | title = {Zero-sum distinguishers for reduced Keccak-f and for the core functions of Luffa and Hamsi}, | ||
+ | url = {http://www.131002.net/data/papers/AM09.pdf}, | ||
+ | howpublished = {NIST mailing list} | ||
year = {2009}, | year = {2009}, | ||
</bibtex> | </bibtex> |
Revision as of 19:38, 14 September 2009
1 The algorithm
- Author(s): Özgül Kücük
- Website: http://homes.esat.kuleuven.be/~okucuk/hamsi/
- NIST submission package: Hamsi.zip, HamsiUpdate.zip
- an updated reference implementation can be found here (Hamsi website)
Özgül Kücük - The Hash Function Hamsi
- ,2008
- http://ehash.iaik.tugraz.at/uploads/9/95/Hamsi.pdf
BibtexAuthor : Özgül Kücük
Title : The Hash Function Hamsi
In : -
Address :
Date : 2008
2 Cryptanalysis
Type of Analysis | Hash Function Part | Hash Size (n) | Parameters/Variants | Compression Function Calls | Memory Requirements | Reference |
non-randomness | compression function | 224, 256 | 5 rounds | Aumasson | ||
near-collision | compression function | 224, 256 | 3 rounds | 221 | Nikolic | |
non-randomness | compression function | 224, 256 | 6 rounds | 227 | Aumasson,Meier | |
non-randomness | compression function | 224, 256 | 12 rounds | 2729 | Aumasson,Meier |
A description of this table is given here.
Jean-Philippe Aumasson - On the pseudorandomness of Hamsi
- ,2009
- http://ehash.iaik.tugraz.at/uploads/d/db/Hamsi_nonrandomness.txt
BibtexAuthor : Jean-Philippe Aumasson
Title : On the pseudorandomness of Hamsi
In : -
Address :
Date : 2009
Ivica Nikolic - Near Collisions for the Compression Function of Hamsi-256
- ,2009
- http://rump2009.cr.yp.to/936779b3afb9b48a404b487d6865091d.pdf
BibtexAuthor : Ivica Nikolic
Title : Near Collisions for the Compression Function of Hamsi-256
In : -
Address :
Date : 2009
Jean-Philippe Aumasson, Willi Meier - Zero-sum distinguishers for reduced Keccak-f and for the core functions of Luffa and Hamsi