NKS2D

From The ECRYPT Hash Function Website

Jump to: navigation, search

1 The algorithm


Geoffrey Park - NKS 2D Cellular Automata Hash
Submission to NIST, 2008
[Electronic Edition] [Bibtex]
Author : Geoffrey Park
Title : NKS 2D Cellular Automata Hash
In : Submission to NIST -


2 Cryptanalysis

Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference
collision hash 224 example - De Cannière
collision hash 512 example - Enright

A description of this table is given here.


Christophe De Cannière - Collisions for NKS2D-224
NIST mailing list (local link), 2008
[Electronic Edition] [Bibtex]
Author : Christophe De Cannière
Title : Collisions for NKS2D-224
In : NIST mailing list (local link) -

Brandon Enright - Collisions for NKS2D-512
NIST mailing list (local link), 2008
[Electronic Edition] [Bibtex]
Author : Brandon Enright
Title : Collisions for NKS2D-512
In : NIST mailing list (local link) -
Personal tools