Difference between revisions of "The eHash Main Page"

From The ECRYPT Hash Function Website
(Some How Tos)
 
(55 intermediate revisions by 5 users not shown)
Line 1: Line 1:
== List of Hash Functions ==
+
'''The content of this page is no longer maintained.''' <br>
 +
'''The content of this page is no longer maintained.''' <br>
 +
'''The content of this page is no longer maintained.''' <br>
 +
'''The content of this page is no longer maintained.''' <br>
 +
'''The content of this page is no longer maintained.''' <br>
  
On this page you can find a collection of existing hash functions.
 
  
[http://mediawiki.iaik.tugraz.at/index.php/HashFunctions Collection of Cryptographic Hash Functions]
+
= Introduction =
  
== Notation and Definition ==
+
An [[Introduction to Hash Functions|introduction]] to cryptographic hash functions.
  
== Generic Attacks on Hash Functions ==
 
  
== Some How Tos ==
+
= The Hash Function Zoo =
  
<math>
+
The [[The Hash Function Zoo|Hash Function Zoo]] is a collection of peer-reviewed hash functions.
{\textbf x}_{t} = {\textbf f}({x}_{t-1},{u}_{t-1},{p}_{t-1})
 
</math>
 
  
if we want to use the amsmath package we have to usse the class <amsmath></amsmath>.  
+
The [[The SHA-3 Zoo|SHA-3 Zoo]] contains functions submitted to the [http://www.nist.gov/hash-competition NIST Hash Competition]. We also collect [[SHA-3_Hardware_Implementations | hardware implementation results]] of the candidates.  
Automated numbering of equations works within a single amsmath environment but only if we do some dirty hacking ... (click on the equation to see why). If we start a new <masmath> environment then the equation numbering starts from counter=1 again. So in general, we should not expect that we can do whatever we want with the <amsmath></amsmath>.
 
  
<amsmath>
+
= Generic Attacks on Hash Functions =
\end{equation*}
 
\begin{equation}
 
a = \sum_{i=0}^{n}{2^i}
 
\end{equation}
 
\begin{equation*}
 
</amsmath>
 
  
start a new <amsmath></amsmath> environment:
 
  
<amsmath>
+
[[Generic_Attacks| Generic Attacks on Hash Functions]].
\end{equation*}
 
\begin{equation}
 
b = \sum_{i=0}^{n}{2^i}
 
\end{equation}
 
\begin{equation}
 
a = \sum_{i=0}^{n}{2^i}
 
\end{equation}
 
\begin{equation*}
 
</amsmath>
 
  
as we see both envrionments start with 1.
+
[[GenericAttacksMerkleDamgaard| Generic Attacks on the Merkle-Damgaard Construction]].
  
[http://mediawiki.iaik.tugraz.at/index.php/Testpage1 Testpage1]
 
  
== Getting started ==
+
= Editors corner =
  
* [http://www.mediawiki.org/wiki/Help:FAQ MediaWiki FAQ]
+
[[HowTo | How to]] work with math environments and BibTeX.
* [http://mail.wikipedia.org/mailman/listinfo/mediawiki-announce MediaWiki release mailing list]
+
 
 +
Mediawiki [http://www.mediawiki.org/wiki/Category:Help  help], [http://www.mediawiki.org/wiki/Help:FAQ FAQ], and release [http://mail.wikipedia.org/mailman/listinfo/mediawiki-announce mailing list].
  
  
Line 52: Line 35:
 
ECRYPT is a Network of Excellence within the Information Societies Technology (IST) Programme of the European Commission. The information on this web site is provided as is, and no guarantee or warranty is given or implied that the information is fit for any particular purpose. The user thereof uses the information at his or her sole risk and liability.
 
ECRYPT is a Network of Excellence within the Information Societies Technology (IST) Programme of the European Commission. The information on this web site is provided as is, and no guarantee or warranty is given or implied that the information is fit for any particular purpose. The user thereof uses the information at his or her sole risk and liability.
 
----
 
----
 +
 +
'''The content of this page is no longer maintained.''' <br>
 +
'''The content of this page is no longer maintained.''' <br>
 +
'''The content of this page is no longer maintained.''' <br>
 +
'''The content of this page is no longer maintained.''' <br>
 +
'''The content of this page is no longer maintained.''' <br>

Latest revision as of 10:34, 21 June 2024

The content of this page is no longer maintained.
The content of this page is no longer maintained.
The content of this page is no longer maintained.
The content of this page is no longer maintained.
The content of this page is no longer maintained.


1 Introduction

An introduction to cryptographic hash functions.


2 The Hash Function Zoo

The Hash Function Zoo is a collection of peer-reviewed hash functions.

The SHA-3 Zoo contains functions submitted to the NIST Hash Competition. We also collect hardware implementation results of the candidates.

3 Generic Attacks on Hash Functions

Generic Attacks on Hash Functions.

Generic Attacks on the Merkle-Damgaard Construction.


4 Editors corner

How to work with math environments and BibTeX.

Mediawiki help, FAQ, and release mailing list.



ECRYPT is a Network of Excellence within the Information Societies Technology (IST) Programme of the European Commission. The information on this web site is provided as is, and no guarantee or warranty is given or implied that the information is fit for any particular purpose. The user thereof uses the information at his or her sole risk and liability.


The content of this page is no longer maintained.
The content of this page is no longer maintained.
The content of this page is no longer maintained.
The content of this page is no longer maintained.
The content of this page is no longer maintained.