Difference between revisions of "SHAMATA"

From The ECRYPT Hash Function Website
(Improved Cryptanalysis of SHAMATA-BC)
m (Cryptanalysis)
Line 39: Line 39:
 
   howpublished = {Available online},
 
   howpublished = {Available online},
 
   year      = {2008},
 
   year      = {2008},
   abstract = {We state the design flaws of the 1-round block cipher SHA-  
+
   abstract = {We state the design flaws of the 1-round block cipher SHA-MATA-BC, designed by Fleishmann and Gorski by using the building blocks of SHAMATA hash function. We fix the flaws and then show that the amended version of SHAMATA-BC is much weaker. We believe that there is no connection between security level of SHAMATA as a hash function and that of SHAMATA-BC as a block cipher},
MATA-BC, designed by Fleishmann and Gorski by using the building  
 
blocks of SHAMATA hash function. We fix the flaws and then show that  
 
the amended version of SHAMATA-BC is much weaker. We believe that  
 
there is no connection between security level of SHAMATA as a hash  
 
function and that of SHAMATA-BC as a block cipher},
 
 
}
 
}
 
</bibtex>
 
</bibtex>

Revision as of 16:57, 1 December 2008