Difference between revisions of "SHAMATA"

From The ECRYPT Hash Function Website
m (Cryptanalysis)
m (Cryptanalysis)
Line 25: Line 25:
 
   howpublished = {Available online},
 
   howpublished = {Available online},
 
   year      = {2008},
 
   year      = {2008},
   abstract = {In this note we discuss some observation of the SHA-3 candidate SHAMATA [1]. We ob-
+
   abstract = {In this note we discuss some observation of the SHA-3 candidate SHAMATA [1]. We observe that its internal block cipher is very weak, which could possibly lead to an attack on the hash function.},
serve that its internal block cipher is very weak, which could possibly lead to an attack on the hash  
 
function.},
 
 
}
 
}
 
</bibtex>
 
</bibtex>

Revision as of 16:57, 1 December 2008