GOST

From The ECRYPT Hash Function Website
Revision as of 13:19, 7 March 2008 by Crechberger (talk | contribs)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

1 General

2 Cryptanalysis

2.1 Best Known Results


2.2 Generic Attacks


2.3 Collision Attacks


2.4 Second Preimage Attacks


2.5 Preimage Attacks


2.6 Others

3 Performance Evaluation / Implementation (HW and SW)