Difference between revisions of "Vortex (SHA-3 submission)"

From The ECRYPT Hash Function Website
(note on Vortex' security)
Line 20: Line 20:
  
 
<bibtex>
 
<bibtex>
@misc{vortex08,
+
@misc{vortexK+08,
 
   author    = {Lars R. Knudsen and Florian Mendel and Christian Rechberger and Søren S. Thomsen},
 
   author    = {Lars R. Knudsen and Florian Mendel and Christian Rechberger and Søren S. Thomsen},
 
   title    = {Collision and Preimage Attacks on Vortex as submitted to the SHA-3 competition},
 
   title    = {Collision and Preimage Attacks on Vortex as submitted to the SHA-3 competition},
 
   url        = {http://ehash.iaik.tugraz.at/uploads/5/5c/Vortex_Collisions_and_Preimages_note.txt},
 
   url        = {http://ehash.iaik.tugraz.at/uploads/5/5c/Vortex_Collisions_and_Preimages_note.txt},
 +
  howpublished = {Available online},
 +
  year      = {2008},
 +
}
 +
</bibtex>
 +
 +
 +
<bibtex>
 +
@misc{vortexAD08,
 +
  author    = {Jean-Philippe Aumasson and Orr Dunkelman},
 +
  title    = {A note on Vortex' security},
 +
  url        = {http://www.131002.net/data/papers/AD08.pdf},
 
   howpublished = {Available online},
 
   howpublished = {Available online},
 
   year      = {2008},
 
   year      = {2008},
 
}
 
}
 
</bibtex>
 
</bibtex>

Revision as of 09:57, 5 December 2008