Difference between revisions of "NaSHA"
From The ECRYPT Hash Function Website
(Free-start attacks on NaSHA) |
m (→Cryptanalysis) |
||
Line 22: | Line 22: | ||
author = {Ivica Nikolić and Dmitry Khovratovich}, | author = {Ivica Nikolić and Dmitry Khovratovich}, | ||
title = {Free-start attacks on NaSHA}, | title = {Free-start attacks on NaSHA}, | ||
− | url | + | url = {http://ehash.iaik.tugraz.at/uploads/3/33/Free-start_attacks_on_Nasha.pdf}, |
howpublished = {Available online}, | howpublished = {Available online}, | ||
year = {2008}, | year = {2008}, |
Revision as of 13:55, 3 December 2008
1 The algorithm
- Author(s): Smile Markovski, Aleksandra Mileva
- Website: http://inf.ugd.edu.mk/images/stories/file/Mileva/Nasha.htm
- Specification:
Smile Markovski, Aleksandra Mileva - 2.B.1 Algorithm Specification
- ,2008
- http://inf.ugd.edu.mk/images/stories/file/Mileva/part2b1.pdf
BibtexAuthor : Smile Markovski, Aleksandra Mileva
Title : 2.B.1 Algorithm Specification
In : -
Address :
Date : 2008
2 Cryptanalysis
Ivica Nikolić, Dmitry Khovratovich - Free-start attacks on NaSHA