fix subtle semantic bug

[Imported from Trac: page Bibliography, version 29]
zooko 2008-11-09 14:44:06 +00:00
parent 68a1b85272
commit 70d7198be2

@ -11,7 +11,7 @@ Here are some papers that are potentially of interest.
[ChaChaCha 20](http://cr.yp.to/chacha.html) even better stream cipher. It is probably slightly safer than Salsa and it is certainly slightly faster. [ChaChaCha 20](http://cr.yp.to/chacha.html) even better stream cipher. It is probably slightly safer than Salsa and it is certainly slightly faster.
[EnRUPT](http://enrupt.com) a very simple, fast, and flexible primitive which could be used as stream cipher, secure hash function, or MAC (the first two are primitives that we currently need, and the third one -- MAC -- is a primitive that we may want in the future) and which relies for its security on a large number of rounds. The question of how many rounds to use is decided by semi-automated cryptanalysis. (Note: the stream-hash version of enRUPT, known is "irRUPT" has been shown to be insecure in the SHA-3 contest. The traditional Merkle-Damgard variant -- mdRUPT -- is probably still secure.) [EnRUPT](http://enrupt.com) a very simple, fast, and flexible primitive which could be used as stream cipher, secure hash function, or MAC (the first two are primitives that we currently need, and the third one -- MAC -- is a primitive that we may want in the future) and which relies for its security on a large number of rounds. The question of how many rounds to use is decided by semi-automated cryptanalysis. (Note: the stream-hash version of enRUPT, known is "irRUPT" has been shown to be insecure in the SHA-3 contest. The traditional Merkle-Damgard variant -- mdRUPT -- is probably secure.)
[defectoscopy.com](http://defectoscopy.com/results.html) a table of semi-automated cryptanalysis results from the inventors of EnRUPT. This technique is not well accepted by the mainstream of cryptographers. I (Zooko) can't judge how valid it is. Note that Tiger is one of only two hash functions that are predicted to be secure by this analysis -- the other is Whirlpool. MD-4/5, SHA-0/1/2, and GOST are predicted to be insecure. [defectoscopy.com](http://defectoscopy.com/results.html) a table of semi-automated cryptanalysis results from the inventors of EnRUPT. This technique is not well accepted by the mainstream of cryptographers. I (Zooko) can't judge how valid it is. Note that Tiger is one of only two hash functions that are predicted to be secure by this analysis -- the other is Whirlpool. MD-4/5, SHA-0/1/2, and GOST are predicted to be insecure.