Twister

From The ECRYPT Hash Function Website
Revision as of 10:16, 24 June 2009 by Mschlaeffer (talk | contribs)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

1 The algorithm


Ewan Fleischmann, Christian Forler, Michael Gorski - The Twister Hash Function Family

,2008
http://ehash.iaik.tugraz.at/uploads/3/39/Twister.pdf
Bibtex
Author : Ewan Fleischmann, Christian Forler, Michael Gorski
Title : The Twister Hash Function Family
In : -
Address :
Date : 2008


2 Cryptanalysis

Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference
pseudo-collision compression all 28 - Mendel,Rechberger,Schläffer
collision hash 512 2252 29 Mendel,Rechberger,Schläffer
2nd preimage hash 512 2384+s 264-s Mendel,Rechberger,Schläffer
preimage hash 512 2456 210 Mendel,Rechberger,Schläffer

A description of this table is given here.


Florian Mendel, Christian Rechberger, Martin Schläffer - Cryptanalysis of Twister

,2009
http://online.tu-graz.ac.at/tug_online/voe_main2.getVollText?pDocumentNr=104903
Bibtex
Author : Florian Mendel, Christian Rechberger, Martin Schläffer
Title : Cryptanalysis of Twister
In : -
Address :
Date : 2009


2.1 Archive

Florian Mendel, Christian Rechberger, Martin Schläffer - Cryptanalysis of Twister

,2008
http://ehash.iaik.tugraz.at/uploads/d/dd/Twister_attack.pdf
Bibtex
Author : Florian Mendel, Christian Rechberger, Martin Schläffer
Title : Cryptanalysis of Twister
In : -
Address :
Date : 2008