NaSHA

From The ECRYPT Hash Function Website
Revision as of 16:17, 16 December 2008 by Fmendel (talk | contribs) (→‎Cryptanalysis)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to:navigation, search

1 The algorithm

  • Author(s): Smile Markovski, Aleksandra Mileva
  • Website: http://inf.ugd.edu.mk/images/stories/file/Mileva/Nasha.htm
  • NIST submission package: NaSHA.zip
  • Specification:

Smile Markovski, Aleksandra Mileva - 2.B.1 Algorithm Specification

,2008
http://inf.ugd.edu.mk/images/stories/file/Mileva/part2b1.pdf
Bibtex
Author : Smile Markovski, Aleksandra Mileva
Title : 2.B.1 Algorithm Specification
In : -
Address :
Date : 2008

2 Cryptanalysis

Ivica Nikolić, Dmitry Khovratovich - Free-start attacks on NaSHA

,2008
http://ehash.iaik.tugraz.at/uploads/3/33/Free-start_attacks_on_Nasha.pdf
Bibtex
Author : Ivica Nikolić, Dmitry Khovratovich
Title : Free-start attacks on NaSHA
In : -
Address :
Date : 2008

Li Ji, Xu Liangyu, Guan Xu - Collision attack on NaSHA-512

,2008
http://eprint.iacr.org/2008/519.pdf
Bibtex
Author : Li Ji, Xu Liangyu, Guan Xu
Title : Collision attack on NaSHA-512
In : -
Address :
Date : 2008
Retrieved from "https://ehash.iaik.tugraz.at/index.php?title=NaSHA&oldid=2710"

Navigation menu

Views

  • Page
  • Discussion
  • View source
  • History

Personal tools

  • Log in

Navigation

  • The eHash Main Page
  • Hash Function Zoo
  • SHA-3 Zoo
  • Recent changes
  • Random page
  • Help

 

Tools

  • What links here
  • Related changes
  • Special pages
  • Printable version
  • Permanent link
  • Page information
Powered by MediaWiki
  • Privacy policy
  • About The ECRYPT Hash Function Website
  • Disclaimers