Difference between revisions of "JH"

From The ECRYPT Hash Function Website
(An Observation on JH-512)
m (Cryptanalysis)
Line 31: Line 31:
 
<bibtex>
 
<bibtex>
 
@misc{MT08,
 
@misc{MT08,
   author    = {Florian MEndel, Søren S. Thomsen},
+
   author    = {Florian Mendel, Søren S. Thomsen},
 
   title    = {An Observation on JH-512},
 
   title    = {An Observation on JH-512},
 
   url = {http://ehash.iaik.tugraz.at/uploads/d/da/Jh_preimage.pdf},  
 
   url = {http://ehash.iaik.tugraz.at/uploads/d/da/Jh_preimage.pdf},  
 
   howpublished = {Available online)},
 
   howpublished = {Available online)},
 
   year = {2008},
 
   year = {2008},
 
+
  abstract  = {In this paper, we present a generic preimage attack on JH-512. We do not claim that
 +
our attack breaks JH-512, but it shows weaknesses in the design principles of JH-512 which do not
 +
exist in other hash functions, e.g., the SHA-2 family.},
 
}
 
}
 
</bibtex>
 
</bibtex>

Revision as of 15:19, 9 December 2008