Dynamic SHA2

From The ECRYPT Hash Function Website
Revision as of 21:07, 29 December 2008 by Mschlaeffer (talk | contribs) (Cryptanalysis)

1 The algorithm


Zijie Xu - Dynamic SHA2

,2008
http://ehash.iaik.tugraz.at/uploads/5/5b/DyamicSHA2.pdf
Bibtex
Author : Zijie Xu
Title : Dynamic SHA2
In : -
Address :
Date : 2008


2 Cryptanalysis

Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference
length-extension hash all - - Klima

A description of this table is given here.


Vlastimil Klima - Dynamic SHA2 is vulnerable to generic attacks

,2008
http://ehash.iaik.tugraz.at/uploads/0/0e/Dynamic-sha2_length-extension.txt
Bibtex
Author : Vlastimil Klima
Title : Dynamic SHA2 is vulnerable to generic attacks
In : -
Address :
Date : 2008