Difference between revisions of "NaSHA"
From The ECRYPT Hash Function Website
(→The algorithm) |
|||
Line 4: | Line 4: | ||
* Website: [http://inf.ugd.edu.mk/images/stories/file/Mileva/Nasha.htm http://inf.ugd.edu.mk/images/stories/file/Mileva/Nasha.htm] | * Website: [http://inf.ugd.edu.mk/images/stories/file/Mileva/Nasha.htm http://inf.ugd.edu.mk/images/stories/file/Mileva/Nasha.htm] | ||
* Specification: | * Specification: | ||
+ | |||
+ | <bibtex> | ||
+ | @misc{sha3MM08, | ||
+ | author = {Smile Markovski and Aleksandra Mileva }, | ||
+ | title = {2.B.1 Algorithm Specification}, | ||
+ | howpublished = {Submission to NIST}, | ||
+ | year = {2008}, | ||
+ | } | ||
+ | </bibtex> | ||
== Cryptanalysis == | == Cryptanalysis == | ||
* None yet | * None yet |
Revision as of 16:32, 2 November 2008
1 The algorithm
- Author(s): Smile Markovski, Aleksandra Mileva
- Website: http://inf.ugd.edu.mk/images/stories/file/Mileva/Nasha.htm
- Specification:
Smile Markovski, Aleksandra Mileva - 2.B.1 Algorithm Specification
2 Cryptanalysis
- None yet