From gokaysa@gmail.com Tue Oct 28 02:49:32 2008 Date: Tue, 28 Oct 2008 12:49:24 +0300 From: Gokay Saldamli To: Megan L. Maguire Cc: koc , Cody Walker , Alex Troesch , Jacob Topper , Carl Minden Subject: Re: s-hash documentation X-IMAPbase: 1279770017 1 Status: O X-Status: X-Keywords: X-UID: 1   Dear Megan, First let me see what you have done so far.  today and tomorrow I will be out off office and will be working on these issues. gokay    PS. At last I finished the the working maple 8 code for whole shash including the hash generation for different hash sizes.   ---------- Forwarded message ---------- From: Megan L. Maguire Date: Tue, Oct 28, 2008 at 7:09 AM Subject: s-hash documentation To: Gokay Saldamli Cc: koc So the deadline for submission is rapidly approaching, and we are desperately trying to finish the required documentation. However the design rationale and security analysis sections are giving us trouble, mainly because we simply don't know a lot about why s-hash is secure or what you took into consideration when designing it. Also, we need more explicit information on the advantages and disadvantages of s-hash, and it's ability to be implemented on platforms with limited resources, etc. Basically, we have the math background and algorithm description sections done, but we need help with everything else. -- Megan L. Maguire mmaguire@umail.ucsb.edu *panic* *hyperventilate* *panic* *hyperventilate* *panic* *hyperventilate* *panic* *hyperventilate* *panic* *hyperventilate* *panic* *hyperventilate* [ Part 2, Application/OCTET-STREAM (Name: "shash_v2.mws") 212KB. ] [ Unable to print this part. ]