Difference between revisions of "MAME"

From The ECRYPT Hash Function Website
(Best Known Results)
 
(One intermediate revision by one other user not shown)
Line 1: Line 1:
 
== Specification ==
 
== Specification ==
  
 +
* digest size: 256 bits
 
<!--  
 
<!--  
* digest size: 160 bits
 
 
* max. message length: < 2<sup>64</sup> bits
 
* max. message length: < 2<sup>64</sup> bits
* compression function: 512-bit message block, 160-bit chaining variable
 
 
-->
 
-->
* Specification: [http://www.sdl.hitachi.co.jp/english/news/2007/ches/ MAME]
+
* compression function: 256-bit message block, 256-bit chaining variable
 +
* Specification: [http://www.sdl.hitachi.co.jp/english/news/2007/ches/ MAME], [http://dx.doi.org/10.1007/978-3-540-74735-2_11 CHES07]
  
 
<bibtex>
 
<bibtex>
Line 29: Line 29:
  
 
=== Best Known Results ===
 
=== Best Known Results ===
 
+
No attacks known.
 
----
 
----
  

Latest revision as of 12:51, 10 November 2008

1 Specification

  • digest size: 256 bits
  • compression function: 256-bit message block, 256-bit chaining variable
  • Specification: MAME, CHES07

Hirotaka Yoshida, Dai Watanabe, Katsuyuki Okeya, Jun Kitahara, Hongjun Wu, Ozgul Kucuk, Bart Preneel - MAME: A Compression Function with Reduced Hardware Requirements

CHES 4727:148-165,2007
http://dx.doi.org/10.1007/978-3-540-74735-2_11
Bibtex
Author : Hirotaka Yoshida, Dai Watanabe, Katsuyuki Okeya, Jun Kitahara, Hongjun Wu, Ozgul Kucuk, Bart Preneel
Title : MAME: A Compression Function with Reduced Hardware Requirements
In : CHES -
Address :
Date : 2007

2 Cryptanalysis

2.1 Best Known Results

No attacks known.


2.2 Generic Attacks


2.3 Collision Attacks


2.4 Second Preimage Attacks


2.5 Preimage Attacks


2.6 Others