Difference between revisions of "JH"

From The ECRYPT Hash Function Website
m (Cryptanalysis)
m (Cryptanalysis)
Line 34: Line 34:
 
   title    = {An Observation on JH-512},
 
   title    = {An Observation on JH-512},
 
   url = {http://ehash.iaik.tugraz.at/uploads/d/da/Jh_preimage.pdf},  
 
   url = {http://ehash.iaik.tugraz.at/uploads/d/da/Jh_preimage.pdf},  
   howpublished = {Available online)},
+
   howpublished = {Available online},
 
   year = {2008},
 
   year = {2008},
   abstract  = {In this paper, we present a generic preimage attack on JH-512. We do not claim that
+
   abstract  = {In this paper, we present a generic preimage attack on JH-512. We do not claim that our attack breaks JH-512, but it shows weaknesses in the design principles of JH-512 which do not exist in other hash functions, e.g., the SHA-2 family.},
our attack breaks JH-512, but it shows weaknesses in the design principles of JH-512 which do not
 
exist in other hash functions, e.g., the SHA-2 family.},
 
 
}
 
}
 
</bibtex>
 
</bibtex>

Revision as of 15:20, 9 December 2008