LUX
From The ECRYPT Hash Function Website
1 The algorithm
- Author(s): Ivica Nikolić, Alex Biryukov, and Dmitry Khovratovich
- NIST submission package: LUX.zip
Ivica Nikolić, Alex Biryukov,, Dmitry Khovratovich - Hash family LUX - Algorithm Specifications and
Supporting Documentation
- ,2008
- http://ehash.iaik.tugraz.at/uploads/f/f3/LUX.pdf
BibtexAuthor : Ivica Nikolić, Alex Biryukov,, Dmitry Khovratovich
Title : Hash family LUX - Algorithm Specifications and Supporting Documentation
In : -
Address :
Date : 2008
2 Cryptanalysis
Type of Analysis | Hash Function Part | Hash Size (n) | Parameters/Variants | Compression Function Calls | Memory Requirements | Reference |
collision | reduced hash | 224 | 3 blank rounds | - | - | Wu,Feng,Wu |
near-collision | reduced hash | 256 | 3 blank rounds | - | - | Wu,Feng,Wu |
free-start collision | compression | ? | - | - | Wu,Feng,Wu | |
free-start preimage | compression | ? | 280 | - | Wu,Feng,Wu | |
slide-attack | hash | all | salt size: 31 mod 32 | - | - | Peyrin |
A description of this table is given here.
Shuang Wu, Dengguo Feng, Wenling Wu - Cryptanalysis of the Hash Function LUX-256
- ,2008
- http://ehash.iaik.tugraz.at/uploads/3/36/Analysis_LUX_1.pdf
BibtexAuthor : Shuang Wu, Dengguo Feng, Wenling Wu
Title : Cryptanalysis of the Hash Function LUX-256
In : -
Address :
Date : 2008
Thomas Peyrin - Slide attacks on LUX