Difference between revisions of "SHAMATA"
From The ECRYPT Hash Function Website
m (→Cryptanalysis) |
m (→Cryptanalysis) |
||
Line 25: | Line 25: | ||
howpublished = {Available online}, | howpublished = {Available online}, | ||
year = {2008}, | year = {2008}, | ||
− | abstract = {In this note we discuss some observation of the SHA-3 candidate SHAMATA [1]. We | + | abstract = {In this note we discuss some observation of the SHA-3 candidate SHAMATA [1]. We observe that its internal block cipher is very weak, which could possibly lead to an attack on the hash function.}, |
− | |||
− | function.}, | ||
} | } | ||
</bibtex> | </bibtex> |
Revision as of 16:57, 1 December 2008
1 The algorithm
- Author(s): Adem Atalay, Orhun Kara, Ferhat Karakoc and Cevat Manap
- Website: http://www.uekae.tubitak.gov.tr/home.do?ot=1&sid=601&pid=547
- Specification:
Adem Atalay, Orhun Kara, Ferhat Karakoc, Cevat Manap - SHAMATA HASH FUNCTION ALGORITHM SPECIFICATIONS
- ,2008
- http://www.uekae.tubitak.gov.tr/uekae_content_files/crypto/SHAMATA%20Specification.pdf
BibtexAuthor : Adem Atalay, Orhun Kara, Ferhat Karakoc, Cevat Manap
Title : SHAMATA HASH FUNCTION ALGORITHM SPECIFICATIONS
In : -
Address :
Date : 2008
2 Cryptanalysis
Ewan Fleischmann, Michael Gorski - Some Observations on SHAMATA
- ,2008
- http://www.uni-weimar.de/cms/fileadmin/medien/medsicherheit/Research/SHA3/Observations_for_SHAMATA.pdf
BibtexAuthor : Ewan Fleischmann, Michael Gorski
Title : Some Observations on SHAMATA
In : -
Address :
Date : 2008
Adem Atalay, Orhun Kara, Ferhat Karakoc - Improved Cryptanalysis of SHAMATA-BC