March 22, 2012
Author(s)
Dustin Moody, Souradyuti Paul, Daniel C. Smith-Tone
The JH hash function is one of the five fi nalists of the ongoing NIST SHA3 hash function competition. Despite several earlier attempts, and years of analysis, the indi fferentiability security bound of the JH mode has so far remained remarkably low, only