Difference between revisions of "Ponic"
From The ECRYPT Hash Function Website
Mschlaeffer (talk | contribs) m |
Mschlaeffer (talk | contribs) m |
||
Line 5: | Line 5: | ||
* Website: | * Website: | ||
--> | --> | ||
− | * Source: [http://ehash.iaik.tugraz.at/uploads/6/61/PonicReference.zip | + | * Source: [http://ehash.iaik.tugraz.at/uploads/6/61/PonicReference.zip submitted to NIST], [http://ehash.iaik.tugraz.at/uploads/2/2e/Ponic-1280.zip improved version] |
Revision as of 18:19, 11 December 2008
1 The algorithm
- Author(s): Peter Schmidt-Nielsen
- Source: submitted to NIST, improved version
Peter Schmidt-Nielsen - The Ponic Hash Function
- ,2008
- http://ehash.iaik.tugraz.at/uploads/3/3c/PonicSpecification.pdf
BibtexAuthor : Peter Schmidt-Nielsen
Title : The Ponic Hash Function
In : -
Address :
Date : 2008
2 Cryptanalysis
María Naya-Plasencia - Second preimage attack on Ponic