Ponic
From The ECRYPT Hash Function Website
1 The algorithm
- Author(s): Peter Schmidt-Nielsen
- Source: submitted to NIST, improved version
Peter Schmidt-Nielsen - The Ponic Hash Function
- ,2008
- http://ehash.iaik.tugraz.at/uploads/3/3c/PonicSpecification.pdf
BibtexAuthor : Peter Schmidt-Nielsen
Title : The Ponic Hash Function
In : -
Address :
Date : 2008
2 Cryptanalysis
Type of Analysis | Hash Function Part | Hash Size (n) | Parameters/Variants | Compression Function Calls | Memory Requirements | Reference |
2nd preimage | hash | 512 | 2265 | 2256 | Naya-Plasencia |
A description of this table is given here.
María Naya-Plasencia - Second preimage attack on Ponic