Difference between revisions of "JH"

From The ECRYPT Hash Function Website
m (The algorithm)
m (Cryptanalysis)
Line 37: Line 37:
 
   howpublished = {Available online},
 
   howpublished = {Available online},
 
   year = {2008},
 
   year = {2008},
   abstract  = {In this paper, we present a generic preimage attack on JH-512. We do not claim that our attack breaks JH-512, but it shows weaknesses in the design principles of JH-512 which do not exist in other hash functions, e.g., the SHA-2 family.},
+
   abstract  = {In this paper, we present a generic preimage attack on JH-512. We do not claim that
 +
our attack breaks JH-512 (due to the high memory requirements), but it uses some interesting
 +
properties in the design principles of JH-512 which do not exist in other hash functions, e.g., the
 +
SHA-2 family.},
 
}
 
}
 
</bibtex>
 
</bibtex>

Revision as of 09:27, 15 December 2008