CRUNCH

From The ECRYPT Hash Function Website

1 The algorithm

  • Author(s): Louis Goubin, Mickael Ivascot, William Jalby, Olivier Ly, Valerie Nachef, Jacques Patarin, Joana Treger, Emmanuel Volte
  • Website: http://www.voltee.com/crunch/
  • NIST submission package: CRUNCH.zip


Louis Goubin, Mickael Ivascot, William Jalby, Olivier Ly, Valerie Nachef, Jacques Patarin, Joana Treger, Emmanuel Volte - CRUNCH

,2008
http://www.voltee.com/crunch/cdrom/Supporting_Documentation/crunch_specifications.pdf
Bibtex
Author : Louis Goubin, Mickael Ivascot, William Jalby, Olivier Ly, Valerie Nachef, Jacques Patarin, Joana Treger, Emmanuel Volte
Title : CRUNCH
In : -
Address :
Date : 2008


2 Cryptanalysis

Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference
length-extension hash all - - Çoban

A description of this table is given here.


Mustafa Çoban - Length-extension attack on CRUNCH

,2009
http://ehash.iaik.tugraz.at/uploads/2/25/Crunch.txt
Bibtex
Author : Mustafa Çoban
Title : Length-extension attack on CRUNCH
In : -
Address :
Date : 2009