Lesamnta
From The ECRYPT Hash Function Website
1 The algorithm
- Author(s): Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida
- Website: http://www.sdl.hitachi.co.jp/crypto/lesamnta/
- NIST submission package: Lesamnta.zip
Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida - SHA-3 Proposal: Lesamnta
- ,2008
- http://ehash.iaik.tugraz.at/uploads/5/5c/Lesamnta.pdf
BibtexAuthor : Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida
Title : SHA-3 Proposal: Lesamnta
In : -
Address :
Date : 2008
Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida - Security Analysis of the Compression Function
of Lesamnta and its Impact
- ,2009
- http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/LESAMNTA_Comments.pdf
BibtexAuthor : Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida
Title : Security Analysis of the Compression Function of Lesamnta and its Impact
In : -
Address :
Date : 2009
2 Cryptanalysis
Type of Analysis | Hash Function Part | Hash Size (n) | Parameters/Variants | Compression Function Calls | Memory Requirements | Reference |
pseudo-collision | compression | 256 | full | O(264) | - | Bouillaguet, Dunkelman, Leurent, Fouque |
A description of this table is given here.
C. Bouillaguet, O. Dunkelman, G. Leurent, P. A. Fouque - Personal communication