From The ECRYPT Hash Function Website
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
1 Specification
2 Cryptanalysis
2.1 Best Known Results
2.2 Generic Attacks
2.3 Collision Attacks
2.4 Second Preimage Attacks
2.5 Preimage Attacks
2.6 Others