Difference between revisions of "SHAvite-3"
From The ECRYPT Hash Function Website
m (added link to website) |
m (updated link to round 2 submission) |
||
Line 3: | Line 3: | ||
* Author(s): Eli Biham and Orr Dunkelman | * Author(s): Eli Biham and Orr Dunkelman | ||
* Website: [http://www.cs.technion.ac.il/~orrd/SHAvite-3/ http://www.cs.technion.ac.il/~orrd/SHAvite-3/] | * Website: [http://www.cs.technion.ac.il/~orrd/SHAvite-3/ http://www.cs.technion.ac.il/~orrd/SHAvite-3/] | ||
− | * NIST submission package: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/SHAvite-3.zip SHAvite-3.zip] | + | * NIST submission package: |
+ | ** round 1: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/SHAvite-3.zip SHAvite-3.zip] (old version: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/SHAvite3Update.zip SHAvite3Update.zip]) | ||
+ | ** round 2: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round2/documents/SHAvite-3_Round2.zip SHAvite-3_Round2.zip] | ||
+ | |||
+ | <bibtex> | ||
+ | @misc{sha3BihamD09, | ||
+ | author = {Eli Biham and Orr Dunkelman}, | ||
+ | title = {The SHAvite-3 Hash Function}, | ||
+ | url = {http://www.cs.technion.ac.il/~orrd/SHAvite-3/Spec.15.09.09.pdf}, | ||
+ | howpublished = {Submission to NIST (Round 2)}, | ||
+ | year = {2009}, | ||
+ | } | ||
+ | </bibtex> | ||
<bibtex> | <bibtex> | ||
Line 11: | Line 23: | ||
title = {The SHAvite-3 Hash Function}, | title = {The SHAvite-3 Hash Function}, | ||
url = {http://ehash.iaik.tugraz.at/uploads/f/f5/Shavite.pdf}, | url = {http://ehash.iaik.tugraz.at/uploads/f/f5/Shavite.pdf}, | ||
− | howpublished = {Submission to NIST}, | + | howpublished = {Submission to NIST (Round 1)}, |
year = {2008}, | year = {2008}, | ||
} | } |
Revision as of 17:27, 23 November 2009
1 The algorithm
- Author(s): Eli Biham and Orr Dunkelman
- Website: http://www.cs.technion.ac.il/~orrd/SHAvite-3/
- NIST submission package:
- round 1: SHAvite-3.zip (old version: SHAvite3Update.zip)
- round 2: SHAvite-3_Round2.zip
Eli Biham, Orr Dunkelman - The SHAvite-3 Hash Function
- ,2009
- http://www.cs.technion.ac.il/~orrd/SHAvite-3/Spec.15.09.09.pdf
BibtexAuthor : Eli Biham, Orr Dunkelman
Title : The SHAvite-3 Hash Function
In : -
Address :
Date : 2009
Eli Biham, Orr Dunkelman - The SHAvite-3 Hash Function
- ,2008
- http://ehash.iaik.tugraz.at/uploads/f/f5/Shavite.pdf
BibtexAuthor : Eli Biham, Orr Dunkelman
Title : The SHAvite-3 Hash Function
In : -
Address :
Date : 2008
2 Cryptanalysis
Type of Analysis | Hash Function Part | Hash Size (n) | Parameters/Variants | Compression Function Calls | Memory Requirements | Reference |
pseudo-collision | compression | all | Peyrin | |||
pseudo-collision | compression | 256 | Nandi,Paul |
A description of this table is given here.
Thomas Peyrin - Chosen-salt, chosen-counter, pseudo-collision on SHAvite-3 compression function
- ,2009
- http://ehash.iaik.tugraz.at/uploads/e/ea/Peyrin-SHAvite-3.txt
BibtexAuthor : Thomas Peyrin
Title : Chosen-salt, chosen-counter, pseudo-collision on SHAvite-3 compression function
In : -
Address :
Date : 2009
Mridul Nandi, Souradyuti Paul - OFFICIAL COMMENT: SHAvite-3