Difference between revisions of "Ponic"
From The ECRYPT Hash Function Website
m (→Cryptanalysis) |
Mschlaeffer (talk | contribs) m |
||
Line 5: | Line 5: | ||
* Website: | * Website: | ||
--> | --> | ||
− | * | + | * Source: [http://ehash.iaik.tugraz.at/uploads/6/61/PonicReference.zip local link] |
+ | |||
<bibtex> | <bibtex> | ||
− | @misc{ | + | @misc{sha3Schmidt08, |
author = {Peter Schmidt-Nielsen}, | author = {Peter Schmidt-Nielsen}, | ||
title = {The Ponic Hash Function}, | title = {The Ponic Hash Function}, | ||
Line 16: | Line 17: | ||
} | } | ||
</bibtex> | </bibtex> | ||
+ | |||
== Cryptanalysis == | == Cryptanalysis == |
Revision as of 18:12, 11 December 2008
1 The algorithm
- Author(s): Peter Schmidt-Nielsen
- Source: local link
Peter Schmidt-Nielsen - The Ponic Hash Function
- ,2008
- http://ehash.iaik.tugraz.at/uploads/3/3c/PonicSpecification.pdf
BibtexAuthor : Peter Schmidt-Nielsen
Title : The Ponic Hash Function
In : -
Address :
Date : 2008
2 Cryptanalysis
María Naya-Plasencia - Second preimage attack on Ponic