Presentation | 2009-12-01 Current Status of A Hash Function Dai WATANABE, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | A cryptographic hash function has a lot of application such as a digital signature and a message authentication code. Recently, several important breakthroughs have been made in the cryptanalysis against hash functions and they imply that most of the currently used standard hash functions are vulnerable against new attacks. In these circumstances, National Institute of Standards and Technology (NIST) decided to organize Cryptographic Hash Algorithm Competition (SHA-3 competition) and started to call for algorithms. In this document, the known technology of a hash function is surveyed and the current status of the SHA-3 competition is introduced. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Hash function / SHA-3 |
Paper # | IT2009-49 |
Date of Issue |
Conference Information | |
Committee | IT |
---|---|
Conference Date | 2009/11/24(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Theory (IT) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Current Status of A Hash Function |
Sub Title (in English) | |
Keyword(1) | Hash function |
Keyword(2) | SHA-3 |
1st Author's Name | Dai WATANABE |
1st Author's Affiliation | Systems Development Laboratory, Hitachi, Ltd.() |
Date | 2009-12-01 |
Paper # | IT2009-49 |
Volume (vol) | vol.109 |
Number (no) | 314 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |