Ponic

From The ECRYPT Hash Function Website
Revision as of 21:59, 29 December 2008 by Fmendel (talk | contribs)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

1 The algorithm


Peter Schmidt-Nielsen - The Ponic Hash Function

,2008
http://ehash.iaik.tugraz.at/uploads/3/3c/PonicSpecification.pdf
Bibtex
Author : Peter Schmidt-Nielsen
Title : The Ponic Hash Function
In : -
Address :
Date : 2008


2 Cryptanalysis

Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference
2nd preimage hash 512 2265 2256 Naya-Plasencia

A description of this table is given here.


María Naya-Plasencia - Second preimage attack on Ponic

,2008
http://131002.net/data/papers/ponic.pdf
Bibtex
Author : María Naya-Plasencia
Title : Second preimage attack on Ponic
In : -
Address :
Date : 2008