Lesamnta

From The ECRYPT Hash Function Website
Revision as of 10:16, 30 July 2009 by Crechberger (talk | contribs) (Update on Lesamta)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

1 The algorithm


Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida - SHA-3 Proposal: Lesamnta

,2008
http://ehash.iaik.tugraz.at/uploads/5/5c/Lesamnta.pdf
Bibtex
Author : Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida
Title : SHA-3 Proposal: Lesamnta
In : -
Address :
Date : 2008

Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida - Security Analysis of the Compression Function

of Lesamnta and its Impact

,2009
http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/LESAMNTA_Comments.pdf
Bibtex
Author : Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida
Title : Security Analysis of the Compression Function of Lesamnta and its Impact
In : -
Address :
Date : 2009

2 Cryptanalysis

Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference
pseudo-collision compression 256 full O(264) - Bouillaguet, Dunkelman, Leurent, Fouque

A description of this table is given here.


C. Bouillaguet, O. Dunkelman, G. Leurent, P. A. Fouque - Personal communication

,2009
Bibtex
Author : C. Bouillaguet, O. Dunkelman, G. Leurent, P. A. Fouque
Title : Personal communication
In : -
Address :
Date : 2009