Whirlwind: A new cryptographic hash function

34Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

A new cryptographic hash function Whirlwind is presented. We give the full specification and explain the design rationale.We show how the hash function can be implemented efficiently in software and give first performance numbers. A detailed analysis of the security against state-of-the-art cryptanalysis methods is also provided. In comparison to the algorithms submitted to the SHA-3 competition, Whirlwind takes recent developments in cryptanalysis into account by design. Even though software performance is not outstanding, it compares favourably with the 512-bit versions of SHA-3 candidates such as LANE or the original CubeHash proposal and is about on par with ECHO and MD6. © The Author(s) 2010.

Cite

CITATION STYLE

APA

Barreto, P., Nikov, V., Nikova, S., Rijmen, V., & Tischhauser, E. (2010). Whirlwind: A new cryptographic hash function. In Designs, Codes, and Cryptography (Vol. 56, pp. 141–162). https://doi.org/10.1007/s10623-010-9391-y

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free