NaSHA
From The ECRYPT Hash Function Website
1 The algorithm
- Author(s): Smile Markovski, Aleksandra Mileva
- Website: http://inf.ugd.edu.mk/images/stories/file/Mileva/Nasha.htm
- NIST submission package: NaSHA.zip
Smile Markovski, Aleksandra Mileva - 2.B.1 Algorithm Specification
- ,2008
- http://inf.ugd.edu.mk/images/stories/file/Mileva/part2b1.pdf
BibtexAuthor : Smile Markovski, Aleksandra Mileva
Title : 2.B.1 Algorithm Specification
In : -
Address :
Date : 2008
2 Cryptanalysis
Type of Analysis | Hash Function Part | Hash Size (n) | Parameters/Variants | Compression Function Calls | Memory Requirements | Reference |
free-start collision | compression | all | 232 | ? | Nikolić,Khovratovich | |
free-start preimage | compression | 224,256 | ~2128 | ? | Nikolić,Khovratovich | |
free-start preimage | compression | 384,512 | ~2256 | ? | Nikolić,Khovratovich | |
free-start collision | compression | all | - | - | Ji,Liangyu,Xu | |
collision | hash | 512 | 2192 | ? | Ji,Liangyu,Xu | |
collision | hash | 384,512 | 2128 | - | Z. Li, D. Li |
A description of this table is given here.
Ivica Nikolić, Dmitry Khovratovich - Free-start attacks on NaSHA
- ,2008
- http://ehash.iaik.tugraz.at/uploads/3/33/Free-start_attacks_on_Nasha.pdf
BibtexAuthor : Ivica Nikolić, Dmitry Khovratovich
Title : Free-start attacks on NaSHA
In : -
Address :
Date : 2008
Li Ji, Xu Liangyu, Guan Xu - Collision attack on NaSHA-512
- ,2008
- http://eprint.iacr.org/2008/519.pdf
BibtexAuthor : Li Ji, Xu Liangyu, Guan Xu
Title : Collision attack on NaSHA-512
In : -
Address :
Date : 2008
Zhimin Li, Daofeng Li - Collision Attack on NaSHA-384/512
- ,2009
- http://eprint.iacr.org/2009/026.pdf
BibtexAuthor : Zhimin Li, Daofeng Li
Title : Collision Attack on NaSHA-384/512
In : -
Address :
Date : 2009
S. Markovski, A. Mileva, V. Dimitrova, D. Gligoroski - On a Conditional Collision Attack on NaSHA-512