Difference between revisions of "SHAvite-3"
From The ECRYPT Hash Function Website
m (added link to website) |
m (updated link to round 2 submission) |
||
| Line 3: | Line 3: | ||
* Author(s): Eli Biham and Orr Dunkelman | * Author(s): Eli Biham and Orr Dunkelman | ||
* Website: [http://www.cs.technion.ac.il/~orrd/SHAvite-3/ http://www.cs.technion.ac.il/~orrd/SHAvite-3/] | * Website: [http://www.cs.technion.ac.il/~orrd/SHAvite-3/ http://www.cs.technion.ac.il/~orrd/SHAvite-3/] | ||
| − | * NIST submission package: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/SHAvite-3.zip SHAvite-3.zip] | + | * NIST submission package: |
| + | ** round 1: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/SHAvite-3.zip SHAvite-3.zip] (old version: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/SHAvite3Update.zip SHAvite3Update.zip]) | ||
| + | ** round 2: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round2/documents/SHAvite-3_Round2.zip SHAvite-3_Round2.zip] | ||
| + | |||
| + | <bibtex> | ||
| + | @misc{sha3BihamD09, | ||
| + | author = {Eli Biham and Orr Dunkelman}, | ||
| + | title = {The SHAvite-3 Hash Function}, | ||
| + | url = {http://www.cs.technion.ac.il/~orrd/SHAvite-3/Spec.15.09.09.pdf}, | ||
| + | howpublished = {Submission to NIST (Round 2)}, | ||
| + | year = {2009}, | ||
| + | } | ||
| + | </bibtex> | ||
<bibtex> | <bibtex> | ||
| Line 11: | Line 23: | ||
title = {The SHAvite-3 Hash Function}, | title = {The SHAvite-3 Hash Function}, | ||
url = {http://ehash.iaik.tugraz.at/uploads/f/f5/Shavite.pdf}, | url = {http://ehash.iaik.tugraz.at/uploads/f/f5/Shavite.pdf}, | ||
| − | howpublished = {Submission to NIST}, | + | howpublished = {Submission to NIST (Round 1)}, |
year = {2008}, | year = {2008}, | ||
} | } | ||
Revision as of 17:27, 23 November 2009
1 The algorithm
- Author(s): Eli Biham and Orr Dunkelman
- Website: http://www.cs.technion.ac.il/~orrd/SHAvite-3/
- NIST submission package:
- round 1: SHAvite-3.zip (old version: SHAvite3Update.zip)
- round 2: SHAvite-3_Round2.zip
Eli Biham, Orr Dunkelman - The SHAvite-3 Hash Function
- ,2009
- http://www.cs.technion.ac.il/~orrd/SHAvite-3/Spec.15.09.09.pdf
BibtexAuthor : Eli Biham, Orr Dunkelman
Title : The SHAvite-3 Hash Function
In : -
Address :
Date : 2009
Eli Biham, Orr Dunkelman - The SHAvite-3 Hash Function
- ,2008
- http://ehash.iaik.tugraz.at/uploads/f/f5/Shavite.pdf
BibtexAuthor : Eli Biham, Orr Dunkelman
Title : The SHAvite-3 Hash Function
In : -
Address :
Date : 2008
2 Cryptanalysis
| Type of Analysis | Hash Function Part | Hash Size (n) | Parameters/Variants | Compression Function Calls | Memory Requirements | Reference |
| pseudo-collision | compression | all | Peyrin | |||
| pseudo-collision | compression | 256 | Nandi,Paul |
A description of this table is given here.
Thomas Peyrin - Chosen-salt, chosen-counter, pseudo-collision on SHAvite-3 compression function
- ,2009
- http://ehash.iaik.tugraz.at/uploads/e/ea/Peyrin-SHAvite-3.txt
BibtexAuthor : Thomas Peyrin
Title : Chosen-salt, chosen-counter, pseudo-collision on SHAvite-3 compression function
In : -
Address :
Date : 2009
Mridul Nandi, Souradyuti Paul - OFFICIAL COMMENT: SHAvite-3