CHI

From The ECRYPT Hash Function Website

1 The algorithm


Phil Hawkes, Cameron McDonald - Submission to the SHA-3 Competition: The CHI Family of Cryptographic Hash Algorithms

,2008
http://ehash.iaik.tugraz.at/uploads/2/2c/Chi_submission.pdf
Bibtex
Author : Phil Hawkes, Cameron McDonald
Title : Submission to the SHA-3 Competition: The CHI Family of Cryptographic Hash Algorithms
In : -
Address :
Date : 2008


2 Cryptanalysis

Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference
pseudo-2nd preimage hash 224/256 1 - Aumasson,Bjørstad,Meier,Mendel

A description of this table is given here.


<bibtex> @misc{chiABMM09,

 author    = {Jean-Philippe Aumasson and Tor E. Bjørstad and Willi Meier and Florian Mendel},
 title     = {Observation on the PRE-MIXING step of CHI-256 and CHI-224},
 url        = {http://ehash.iaik.tugraz.at/uploads/0/0d/Bjorstad_chi.txt},
 howpublished = {OFFICIAL COMMENT},
 year      = {2009},

}