MD6

From The ECRYPT Hash Function Website
Revision as of 16:15, 25 November 2008 by JAumasson (talk | contribs)

1 The algorithm

  • Authors: Ron Rivest, Benjamin Agre, Daniel V. Bailey, Christopher Crutchfield, Yevgeniy Dodis, Kermin Elliott Fleming, Asif Khan, Jayant Krishnamurthy, Yuncheng Lin, Leo Reyzin, Emily Shen, Jim Sukha, Drew Sutherland, Eran Tromer, Yiqun Lisa Yin
  • Website: http://groups.csail.mit.edu/cis/md6/
  • Specification:

Ronald L. Rivest - The MD6 hash function -- A proposal to NIST for SHA-3

,2008
http://groups.csail.mit.edu/cis/md6/submitted-2008-10-27/Supporting_Documentation/md6_report.pdf
Bibtex
Author : Ronald L. Rivest
Title : The MD6 hash function -- A proposal to NIST for SHA-3
In : -
Address :
Date : 2008


2 Cryptanalysis

Jean-Philippe Aumasson, Willi Meier - Personal communication (nonrandomness on the reduced-round compression function)

,2008
http://groups.csail.mit.edu/cis/md6/submitted-2008-10-27/Supporting_Documentation/md6_report.pdf
Bibtex
Author : Jean-Philippe Aumasson, Willi Meier
Title : Personal communication (nonrandomness on the reduced-round compression function)
In : -
Address :
Date : 2008


Itai Dinur, Adi Shamir - Personal communication (key recovery on the reduced-round compression function)

,2008
http://groups.csail.mit.edu/cis/md6/submitted-2008-10-27/Supporting_Documentation/md6_report.pdf
Bibtex
Author : Itai Dinur, Adi Shamir
Title : Personal communication (key recovery on the reduced-round compression function)
In : -
Address :
Date : 2008