Difference between revisions of "SHAvite-3"
From The ECRYPT Hash Function Website
m |
|||
Line 6: | Line 6: | ||
--> | --> | ||
* NIST submission package: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/SHAvite-3.zip SHAvite-3.zip] | * NIST submission package: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/SHAvite-3.zip SHAvite-3.zip] | ||
+ | |||
<bibtex> | <bibtex> | ||
Line 11: | Line 12: | ||
author = {Eli Biham and Orr Dunkelman}, | author = {Eli Biham and Orr Dunkelman}, | ||
title = {The SHAvite-3 Hash Function}, | title = {The SHAvite-3 Hash Function}, | ||
− | url = {}, | + | url = {http://ehash.iaik.tugraz.at/uploads/f/f5/Shavite.pdf}, |
howpublished = {Submission to NIST}, | howpublished = {Submission to NIST}, | ||
year = {2008}, | year = {2008}, |
Revision as of 14:45, 11 December 2008
1 The algorithm
- Author(s): Eli Biham and Orr Dunkelman
- NIST submission package: SHAvite-3.zip
Eli Biham, Orr Dunkelman - The SHAvite-3 Hash Function
- ,2008
- http://ehash.iaik.tugraz.at/uploads/f/f5/Shavite.pdf
BibtexAuthor : Eli Biham, Orr Dunkelman
Title : The SHAvite-3 Hash Function
In : -
Address :
Date : 2008
2 Cryptanalysis
- None yet