Difference between revisions of "TIB3"

From The ECRYPT Hash Function Website
m
(Tweak on TIB3)
Line 13: Line 13:
 
   howpublished = {Submission to NIST},
 
   howpublished = {Submission to NIST},
 
   year      = {2008},
 
   year      = {2008},
 +
}
 +
</bibtex>
 +
 +
<bibtex>
 +
@misc{sha3TIB309,
 +
  author    = {Miguel Montes and Daniel Penazzi},
 +
  title    = {Tweak on TIB3},
 +
  url        = {http://www.famaf.unc.edu.ar/~penazzi/tib3/TweakofTIB3/Supporting_Documentation/TIB3_Tweak.pdf},
 +
  howpublished = {Available online},
 +
  year      = {2009},
 
}
 
}
 
</bibtex>
 
</bibtex>

Revision as of 09:03, 5 May 2009

1 The algorithm


Miguel Montes, Daniel Penazzi - The TIB3 Hash

,2008
http://www.famaf.unc.edu.ar/~penazzi/tib3/submitted/Supporting_Documentation/TIB3_Algorithm_Specification.pdf
Bibtex
Author : Miguel Montes, Daniel Penazzi
Title : The TIB3 Hash
In : -
Address :
Date : 2008

Miguel Montes, Daniel Penazzi - Tweak on TIB3

,2009
http://www.famaf.unc.edu.ar/~penazzi/tib3/TweakofTIB3/Supporting_Documentation/TIB3_Tweak.pdf
Bibtex
Author : Miguel Montes, Daniel Penazzi
Title : Tweak on TIB3
In : -
Address :
Date : 2009


2 Cryptanalysis

Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference
pseudo-collision compression all 224 - Mendel,Schläffer
collision hash 256 2122.5 2122.5 Mendel,Schläffer
collision hash 512 2244.5 2244.5 Mendel,Schläffer

A description of this table is given here.


Florian Mendel, Martin Schläffer - On Pseudo-Collisions and Collisions for TIB3

,2009
http://ehash.iaik.tugraz.at/uploads/2/2b/Tib3-pseudo.pdf
Bibtex
Author : Florian Mendel, Martin Schläffer
Title : On Pseudo-Collisions and Collisions for TIB3
In : -
Address :
Date : 2009