Difference between revisions of "Lesamnta"

From The ECRYPT Hash Function Website
(Lesamnta added)
 
m
Line 6: Line 6:
 
-->
 
-->
 
* NIST submission package: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/Lesamnta.zip Lesamnta.zip]
 
* NIST submission package: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/Lesamnta.zip Lesamnta.zip]
 +
  
 
<bibtex>
 
<bibtex>
Line 11: Line 12:
 
   author    = {Shoichi Hirose and Hidenori Kuwakado and Hirotaka Yoshida},
 
   author    = {Shoichi Hirose and Hidenori Kuwakado and Hirotaka Yoshida},
 
   title    = {SHA-3 Proposal: Lesamnta},
 
   title    = {SHA-3 Proposal: Lesamnta},
   url        = {},
+
   url        = {http://ehash.iaik.tugraz.at/uploads/5/5c/Lesamnta.pdf},
 
   howpublished = {Submission to NIST},
 
   howpublished = {Submission to NIST},
 
   year      = {2008},
 
   year      = {2008},

Revision as of 13:48, 11 December 2008

1 The algorithm

  • Author(s): Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida
  • NIST submission package: Lesamnta.zip


Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida - SHA-3 Proposal: Lesamnta

,2008
http://ehash.iaik.tugraz.at/uploads/5/5c/Lesamnta.pdf
Bibtex
Author : Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida
Title : SHA-3 Proposal: Lesamnta
In : -
Address :
Date : 2008

2 Cryptanalysis

  • None yet