Sciweavers

INDOCRYPT
2009
Springer

Second Preimage Attack on SHAMATA-512

14 years 6 months ago
Second Preimage Attack on SHAMATA-512
We present a second preimage attack on SHAMATA-512, which is a hash function of 512bit output and one of the first round candidates of the SHA-3 competition. The attack uses differential paths that hold with a probability one and a meet-in-the-middle approach to find
Kota Ideguchi, Dai Watanabe
Added 26 May 2010
Updated 26 May 2010
Type Conference
Year 2009
Where INDOCRYPT
Authors Kota Ideguchi, Dai Watanabe
Comments (0)