Difference between revisions of "Lesamnta"
From The ECRYPT Hash Function Website
m |
Crechberger (talk | contribs) (Update on Lesamta) |
||
(One intermediate revision by one other user not shown) | |||
Line 2: | Line 2: | ||
* Author(s): Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida | * Author(s): Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida | ||
− | + | * Website: [http://www.sdl.hitachi.co.jp/crypto/lesamnta/ http://www.sdl.hitachi.co.jp/crypto/lesamnta/] | |
− | * Website: | ||
− | |||
* NIST submission package: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/Lesamnta.zip Lesamnta.zip] | * NIST submission package: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/Lesamnta.zip Lesamnta.zip] | ||
Line 16: | Line 14: | ||
year = {2008}, | year = {2008}, | ||
} | } | ||
+ | </bibtex> | ||
+ | |||
+ | <bibtex> | ||
+ | @misc{sha3HiroseKY09, | ||
+ | author = {Shoichi Hirose and Hidenori Kuwakado and Hirotaka Yoshida} | ||
+ | title = {Security Analysis of the Compression Function | ||
+ | of Lesamnta and its Impact}, | ||
+ | url = {http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/LESAMNTA_Comments.pdf}, | ||
+ | howpublished = {Official comment}, | ||
+ | year = {2009}, | ||
</bibtex> | </bibtex> | ||
== Cryptanalysis == | == Cryptanalysis == | ||
− | + | ||
+ | |||
+ | {| border="1" cellpadding="4" cellspacing="0" class="wikitable" style="text-align:center" | ||
+ | |- style="background:#efefef;" | ||
+ | | Type of Analysis || Hash Function Part || Hash Size (n) || Parameters/Variants || Compression Function Calls || Memory Requirements || Reference | ||
+ | |- | ||
+ | |||
+ | | pseudo-collision || compression || 256 || full || O(2<sup>64</sup>) || - || Bouillaguet, Dunkelman, Leurent, Fouque | ||
+ | |- | ||
+ | |} | ||
+ | |||
+ | A description of this table is given [http://ehash.iaik.tugraz.at/wiki/Cryptanalysis_Categories#Individual_Hash_Function_Tables here]. | ||
+ | |||
+ | |||
+ | <bibtex> | ||
+ | @misc{privateHiroseKY09, | ||
+ | author = {C. Bouillaguet and O. Dunkelman and G. Leurent and P. A. Fouque} | ||
+ | title = {Personal communication}, | ||
+ | howpublished = {Cited in Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida: "Security Analysis of the Compression Function of Lesamnta and its Impact"}, | ||
+ | year = {2009}, | ||
+ | </bibtex> |
Latest revision as of 10:16, 30 July 2009
1 The algorithm
- Author(s): Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida
- Website: http://www.sdl.hitachi.co.jp/crypto/lesamnta/
- NIST submission package: Lesamnta.zip
Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida - SHA-3 Proposal: Lesamnta
- ,2008
- http://ehash.iaik.tugraz.at/uploads/5/5c/Lesamnta.pdf
BibtexAuthor : Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida
Title : SHA-3 Proposal: Lesamnta
In : -
Address :
Date : 2008
Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida - Security Analysis of the Compression Function
of Lesamnta and its Impact
- ,2009
- http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/LESAMNTA_Comments.pdf
BibtexAuthor : Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida
Title : Security Analysis of the Compression Function of Lesamnta and its Impact
In : -
Address :
Date : 2009
2 Cryptanalysis
Type of Analysis | Hash Function Part | Hash Size (n) | Parameters/Variants | Compression Function Calls | Memory Requirements | Reference |
pseudo-collision | compression | 256 | full | O(264) | - | Bouillaguet, Dunkelman, Leurent, Fouque |
A description of this table is given here.
C. Bouillaguet, O. Dunkelman, G. Leurent, P. A. Fouque - Personal communication