Difference between revisions of "NaSHA"
From The ECRYPT Hash Function Website
m (New document on NaSHA added) |
m (BibTeX fix) |
||
Line 82: | Line 82: | ||
<bibtex> | <bibtex> | ||
@misc{MarkovskiMDG-eprint:2009:034, | @misc{MarkovskiMDG-eprint:2009:034, | ||
− | author = {Smile Markovski and Aleksandra Mileva and | + | author = {Smile Markovski and Aleksandra Mileva and Vesna Dimitrova and Danilo Gligoroski}, |
title = {On a Conditional Collision Attack on NaSHA-512}, | title = {On a Conditional Collision Attack on NaSHA-512}, | ||
howpublished = {Cryptology ePrint Archive, Report 2009/034}, | howpublished = {Cryptology ePrint Archive, Report 2009/034}, | ||
Line 93: | Line 93: | ||
<bibtex> | <bibtex> | ||
@misc{MDD09, | @misc{MDD09, | ||
− | author = {Smile Markovski and Aleksandra Mileva and | + | author = {Smile Markovski and Aleksandra Mileva and Vesna Dimitrova}, |
title = {On the Second Conditional Collision Attack on NaSHA-384/512}, | title = {On the Second Conditional Collision Attack on NaSHA-384/512}, | ||
howpublished = {Available online}, | howpublished = {Available online}, |
Latest revision as of 15:48, 23 February 2009
1 The algorithm
- Author(s): Smile Markovski, Aleksandra Mileva
- Website: http://inf.ugd.edu.mk/images/stories/file/Mileva/nasha_hf.html
- NIST submission package: NaSHA.zip
Smile Markovski, Aleksandra Mileva - 2.B.1 Algorithm Specification
- ,2008
- http://inf.ugd.edu.mk/images/stories/file/Mileva/part2b1.pdf
BibtexAuthor : Smile Markovski, Aleksandra Mileva
Title : 2.B.1 Algorithm Specification
In : -
Address :
Date : 2008
2 Cryptanalysis
Type of Analysis | Hash Function Part | Hash Size (n) | Parameters/Variants | Compression Function Calls | Memory Requirements | Reference |
free-start collision | compression | all | 232 | ? | Nikolić,Khovratovich | |
free-start preimage | compression | 224,256 | ~2128 | ? | Nikolić,Khovratovich | |
free-start preimage | compression | 384,512 | ~2256 | ? | Nikolić,Khovratovich | |
free-start collision | compression | all | - | - | Ji,Liangyu,Xu | |
collision | hash | 512 | 2192 | ? | Ji,Liangyu,Xu | |
collision | hash | 384,512 | 2128 | - | Z. Li, D. Li |
A description of this table is given here.
Ivica Nikolić, Dmitry Khovratovich - Free-start attacks on NaSHA
- ,2008
- http://ehash.iaik.tugraz.at/uploads/3/33/Free-start_attacks_on_Nasha.pdf
BibtexAuthor : Ivica Nikolić, Dmitry Khovratovich
Title : Free-start attacks on NaSHA
In : -
Address :
Date : 2008
Li Ji, Xu Liangyu, Guan Xu - Collision attack on NaSHA-512
- ,2008
- http://eprint.iacr.org/2008/519.pdf
BibtexAuthor : Li Ji, Xu Liangyu, Guan Xu
Title : Collision attack on NaSHA-512
In : -
Address :
Date : 2008
Zhimin Li, Daofeng Li - Collision Attack on NaSHA-384/512
- ,2009
- http://eprint.iacr.org/2009/026.pdf
BibtexAuthor : Zhimin Li, Daofeng Li
Title : Collision Attack on NaSHA-384/512
In : -
Address :
Date : 2009
Smile Markovski, Aleksandra Mileva, Vesna Dimitrova, Danilo Gligoroski - On a Conditional Collision Attack on NaSHA-512
- ,2009
- http://eprint.iacr.org/2009/034.pdf
BibtexAuthor : Smile Markovski, Aleksandra Mileva, Vesna Dimitrova, Danilo Gligoroski
Title : On a Conditional Collision Attack on NaSHA-512
In : -
Address :
Date : 2009
Smile Markovski, Aleksandra Mileva, Vesna Dimitrova - On the Second Conditional Collision Attack on NaSHA-384/512