SONY

menu
Search button in the site

Open the search area of the site??

AURORA A Cryptographic Hash Algorithm Family

  • Home
  • Download
  • Analysis
  • Implementations
  • Bibliography
  • Links
  • History

Bibliography

External Evaluations

N. Ferguson and Stefan Lucks, “Attacks on AURORA-512 and the Double-Mix Merkle-Damgaard transform,” IACR ePrint archive 2009/113, 2009
Y. Sasaki, “A 2nd-preimage attack on AURORA-512,” IACR ePrint archive 2009/112, 2009
Y. Sasaki, “A collision attack on AURORA-512,” IACR ePrint archive 2009/106, 2009
Y. Sasaki, “A full key recovery attack on HMAC-AURORA-512,” IACR ePrint archive 2009/125, 2009

Documents from Submitters

Toru Akishita, Tadaoki Yamamoto, and Hiroyuki Abe, “Compact Hardware Implementation of the Hash Function AURORA-256,” available on this website.
Tetsu Iwata, Kyoji Shibutani, Taizo Shirai, Shiho Moriai, and Toru Akishita, “AURORA-384/512 version 2: Revised Cryptographic Hash Algorithms in AURORA Family,” available on this website.
Tetsu Iwata, Kyoji Shibutani, Taizo Shirai, Shiho Moriai, and Toru Akishita, AURORA : “A Cryptographic Hash Algorithm Family,” Submitted to NIST SHA-3 competition, also available on this website.