Difference between revisions of "MD6"
From The ECRYPT Hash Function Website
Crechberger (talk | contribs) |
Crechberger (talk | contribs) |
||
Line 1: | Line 1: | ||
− | == | + | == The algorithm == |
* Website: [http://groups.csail.mit.edu/cis/md6/ The MD6 Hash Algorithm] | * Website: [http://groups.csail.mit.edu/cis/md6/ The MD6 Hash Algorithm] | ||
− | * Spezification | + | * Authors: Ron Rivest, Benjamin Agre, Daniel V. Bailey, Christopher Crutchfield, Yevgeniy Dodis, Kermin Elliott Fleming, Asif Khan, Jayant Krishnamurthy, Yuncheng Lin, Leo Reyzin, Emily Shen, Jim Sukha, Drew Sutherland, Eran Tromer, Yiqun Lisa Yin |
+ | * Spezification: | ||
<bibtex> | <bibtex> | ||
Line 8: | Line 9: | ||
author = {Ronald L. Rivest}, | author = {Ronald L. Rivest}, | ||
title = {The MD6 hash function -- A proposal to NIST for SHA-3}, | title = {The MD6 hash function -- A proposal to NIST for SHA-3}, | ||
− | |||
url = {http://groups.csail.mit.edu/cis/md6/submitted-2008-10-27/Supporting_Documentation/md6_report.pdf}, | url = {http://groups.csail.mit.edu/cis/md6/submitted-2008-10-27/Supporting_Documentation/md6_report.pdf}, | ||
+ | howpublished = {Submission to NIST}, | ||
year = {2008}, | year = {2008}, | ||
} | } | ||
</bibtex> | </bibtex> | ||
+ | |||
+ | |||
== Cryptanalysis == | == Cryptanalysis == | ||
Revision as of 15:10, 31 October 2008
1 The algorithm
- Website: The MD6 Hash Algorithm
- Authors: Ron Rivest, Benjamin Agre, Daniel V. Bailey, Christopher Crutchfield, Yevgeniy Dodis, Kermin Elliott Fleming, Asif Khan, Jayant Krishnamurthy, Yuncheng Lin, Leo Reyzin, Emily Shen, Jim Sukha, Drew Sutherland, Eran Tromer, Yiqun Lisa Yin
- Spezification:
Ronald L. Rivest - The MD6 hash function -- A proposal to NIST for SHA-3
- ,2008
- http://groups.csail.mit.edu/cis/md6/submitted-2008-10-27/Supporting_Documentation/md6_report.pdf
BibtexAuthor : Ronald L. Rivest
Title : The MD6 hash function -- A proposal to NIST for SHA-3
In : -
Address :
Date : 2008
2 Cryptanalysis
* Aumasson, Meier: nonrandomness on the 18-round compression function (mentioned in original proposal text). * Dinur, Shamir: cube attack on the 15-round compression function (mentioned in original proposal text).