SHAMATA

From The ECRYPT Hash Function Website
Revision as of 07:59, 21 February 2009 by JAumasson (talk | contribs) (idem...)

1 The algorithm


Adem Atalay, Orhun Kara, Ferhat Karakoc, Cevat Manap - SHAMATA HASH FUNCTION ALGORITHM SPECIFICATIONS

,2008
http://www.uekae.tubitak.gov.tr/uekae_content_files/crypto/SHAMATA%20Specification.pdf
Bibtex
Author : Adem Atalay, Orhun Kara, Ferhat Karakoc, Cevat Manap
Title : SHAMATA HASH FUNCTION ALGORITHM SPECIFICATIONS
In : -
Address :
Date : 2008


2 Cryptanalysis

Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference
observation block cipher Fleischmann,Gorski
observation block cipher Atalay,Kara,Karakoc
2nd preimage hash 512 2451.7 2452.7 Ideguchi,Watanabe

A description of this table is given here.


Ewan Fleischmann, Michael Gorski - Some Observations on SHAMATA

,2008
http://www.uni-weimar.de/cms/fileadmin/medien/medsicherheit/Research/SHA3/Observations_for_SHAMATA.pdf
Bibtex
Author : Ewan Fleischmann, Michael Gorski
Title : Some Observations on SHAMATA
In : -
Address :
Date : 2008

Adem Atalay, Orhun Kara, Ferhat Karakoc - Improved Cryptanalysis of SHAMATA-BC

,2008
http://www.uekae.tubitak.gov.tr/uekae_content_files/crypto/improved_analysis_of_Shamata-BC.pdf
Bibtex
Author : Adem Atalay, Orhun Kara, Ferhat Karakoc
Title : Improved Cryptanalysis of SHAMATA-BC
In : -
Address :
Date : 2008

Kota Ideguchi, Dai Watanabe - Second Preimage Attack on SHAMATA-512

,2009
http://www.sdl.hitachi.co.jp/crypto/eval/shamata_2ndPI.pdf
Bibtex
Author : Kota Ideguchi, Dai Watanabe
Title : Second Preimage Attack on SHAMATA-512
In : -
Address :
Date : 2009