Difference between revisions of "MCSSHA-3"
From The ECRYPT Hash Function Website
m (→Cryptanalysis) |
|||
Line 24: | Line 24: | ||
howpublished = {Available online}, | howpublished = {Available online}, | ||
year = {2008}, | year = {2008}, | ||
+ | abstract = {MCSSHA-3 is a hash function submitted to the NIST Hash Competition. This paper shows how to find second preimages for MCSSHA-3 with h-bit digest in $2^{3h/4}$, and collisions in $2^{3h/8}$. These observations make MCSSHA-3 ineligible for SHA-3.}, | ||
} | } | ||
</bibtex> | </bibtex> |
Revision as of 16:52, 1 December 2008
1 The algorithm
- Author(s): Mikhail Maslennikov
- Website: http://registercsp.nets.co.kr/hash_competition.htm
- Specification:
Mikhail Maslennikov - SECURE HASH ALGORITHM MCSSHA-3
- ,2008
- http://registercsp.nets.co.kr/MCSSHA/MCSSHA-3.pdf
BibtexAuthor : Mikhail Maslennikov
Title : SECURE HASH ALGORITHM MCSSHA-3
In : -
Address :
Date : 2008
2 Cryptanalysis
Jean-Philippe Aumasson, María Naya-Plasencia - Second preimages on MCSSHA-3