WaMM

From The ECRYPT Hash Function Website

Jump to: navigation, search

1 The algorithm


John Washburn - WAMM: A CANDIDATE ALGORITHM FOR THE SHA-3 COMPETITION
Submission to NIST, 2008
[Electronic Edition] [Bibtex]
Author : John Washburn
Title : WAMM: A CANDIDATE ALGORITHM FOR THE SHA-3 COMPETITION
In : Submission to NIST -


2 Cryptanalysis

Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference
collision hash all example - Wilson

A description of this table is given here.


David A. Wilson - Constructing Second Preimages in the WaMM Hash Algorithm
Available online, 2008
[Electronic Edition] [Bibtex]
Author : David A. Wilson
Title : Constructing Second Preimages in the WaMM Hash Algorithm
In : Available online -
Personal tools