VSH

From The ECRYPT Hash Function Website
Revision as of 12:14, 11 March 2008 by Fmendel (talk | contribs)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to:navigation, search

Contents

  • 1 Specification
  • 2 Cryptanalysis
    • 2.1 Best Known Results
    • 2.2 Generic Attacks
    • 2.3 Collision Attacks
    • 2.4 Second Preimage Attacks
    • 2.5 Preimage Attacks
    • 2.6 Others

1 Specification

  • Specification: http://csrc.nist.gov/groups/ST/hash/documents/LENSTRA_vsh.pdf

Scott Contini, Arjen Lenstra, Ron Steinfeld - VSH, an Efficient and Provable Collision Resistant Hash Function

,2005
http://csrc.nist.gov/groups/ST/hash/documents/LENSTRA_vsh.pdf
Bibtex
Author : Scott Contini, Arjen Lenstra, Ron Steinfeld
Title : VSH, an Efficient and Provable Collision Resistant Hash Function
In : -
Address :
Date : 2005

2 Cryptanalysis

2.1 Best Known Results


2.2 Generic Attacks

  • Generic Attacks on the Merkle-Damgaard Construction

2.3 Collision Attacks


2.4 Second Preimage Attacks


2.5 Preimage Attacks


2.6 Others

Markku-Juhani Olavi Saarinen - Security of VSH in the Real World

INDOCRYPT 4329:95-103,2006
http://dx.doi.org/10.1007/11941378_8
Bibtex
Author : Markku-Juhani Olavi Saarinen
Title : Security of VSH in the Real World
In : INDOCRYPT -
Address :
Date : 2006
Retrieved from "https://ehash.iaik.tugraz.at/index.php?title=VSH&oldid=1870"

Navigation menu

Views

  • Page
  • Discussion
  • View source
  • History

Personal tools

  • Log in

Navigation

  • The eHash Main Page
  • Hash Function Zoo
  • SHA-3 Zoo
  • Recent changes
  • Random page
  • Help

 

Tools

  • What links here
  • Related changes
  • Special pages
  • Permanent link
  • Page information
Powered by MediaWiki
  • Privacy policy
  • About The ECRYPT Hash Function Website
  • Disclaimers