Difference between revisions of "Blender"

From The ECRYPT Hash Function Website
m (Cryptanalysis)
m (Cryptanalysis)
Line 28: Line 28:
 
   howpublished = {Available Online},
 
   howpublished = {Available Online},
 
   abstract = {In this paper, we present a preimage attack on the hash function Blender for
 
   abstract = {In this paper, we present a preimage attack on the hash function Blender for
all output sizes. It has a complexity of about $n\cdot 2^{n/2}$ and negligible
+
all output sizes. It has a complexity of about n*2^(n/2) and negligible
 
memory requirements. The attack is based on structural weaknesses in the design
 
memory requirements. The attack is based on structural weaknesses in the design
 
of the hash function and is independent of the underlying compression function.},
 
of the hash function and is independent of the underlying compression function.},

Revision as of 17:56, 20 December 2008