Difference between revisions of "NaSHA"
From The ECRYPT Hash Function Website
(→The algorithm) |
|||
| Line 4: | Line 4: | ||
* Website: [http://inf.ugd.edu.mk/images/stories/file/Mileva/Nasha.htm http://inf.ugd.edu.mk/images/stories/file/Mileva/Nasha.htm] | * Website: [http://inf.ugd.edu.mk/images/stories/file/Mileva/Nasha.htm http://inf.ugd.edu.mk/images/stories/file/Mileva/Nasha.htm] | ||
* Specification: | * Specification: | ||
| + | |||
| + | <bibtex> | ||
| + | @misc{sha3MM08, | ||
| + | author = {Smile Markovski and Aleksandra Mileva }, | ||
| + | title = {2.B.1 Algorithm Specification}, | ||
| + | howpublished = {Submission to NIST}, | ||
| + | year = {2008}, | ||
| + | } | ||
| + | </bibtex> | ||
== Cryptanalysis == | == Cryptanalysis == | ||
* None yet | * None yet | ||
Revision as of 16:32, 2 November 2008
1 The algorithm
- Author(s): Smile Markovski, Aleksandra Mileva
- Website: http://inf.ugd.edu.mk/images/stories/file/Mileva/Nasha.htm
- Specification:
Smile Markovski, Aleksandra Mileva - 2.B.1 Algorithm Specification
2 Cryptanalysis
- None yet