Difference between revisions of "Shabal"
From The ECRYPT Hash Function Website
m (→The algorithm =) |
m |
||
Line 1: | Line 1: | ||
== The algorithm == | == The algorithm == | ||
− | * Author(s): Anne Canteaut, | + | * Author(s): Emmanuel Bresson, Anne Canteaut, Benoît Chevallier-Mames, Christophe Clavier, Thomas Fuhr, Aline Gouget, Thomas Icart, Jean-François Misarsky, Marìa Naya-Plasencia, Pascal Paillier, Thomas Pornin, Jean-René Reinhard, Céline Thuillet, Marion Videau |
* Website: http://www.shabal.com/ | * Website: http://www.shabal.com/ | ||
* NIST submission package: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/Shabal.zip Shabal.zip] | * NIST submission package: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/Shabal.zip Shabal.zip] | ||
Line 7: | Line 7: | ||
<bibtex> | <bibtex> | ||
@misc{sha3CanteautCGPP, | @misc{sha3CanteautCGPP, | ||
− | author = {Anne Canteaut, | + | author = {Emmanuel Bresson, Anne Canteaut, Benoît Chevallier-Mames, Christophe Clavier, Thomas Fuhr, Aline Gouget, Thomas Icart, Jean-François Misarsky, Marìa Naya-Plasencia, Pascal Paillier, Thomas Pornin, Jean-René Reinhard, Céline Thuillet, Marion Videau}, |
title = {Shabal, a Submission to NIST’s Cryptographic Hash Algorithm Competition}, | title = {Shabal, a Submission to NIST’s Cryptographic Hash Algorithm Competition}, | ||
url = {}, | url = {}, |
Revision as of 14:19, 11 December 2008
1 The algorithm
- Author(s): Emmanuel Bresson, Anne Canteaut, Benoît Chevallier-Mames, Christophe Clavier, Thomas Fuhr, Aline Gouget, Thomas Icart, Jean-François Misarsky, Marìa Naya-Plasencia, Pascal Paillier, Thomas Pornin, Jean-René Reinhard, Céline Thuillet, Marion Videau
- Website: http://www.shabal.com/
- NIST submission package: Shabal.zip
Emmanuel Bresson, Anne Canteaut, Benoît Chevallier-Mames, Christophe Clavier, Thomas Fuhr, Aline Gouget, Thomas Icart, Jean-François Misarsky, Marìa Naya-Plasencia, Pascal Paillier, Thomas Pornin, Jean-René Reinhard, Céline Thuillet, Marion Videau - Shabal, a Submission to NIST’s Cryptographic Hash Algorithm Competition
2 Cryptanalysis
- None yet