Difference between revisions of "WaMM"
From The ECRYPT Hash Function Website
Crechberger (talk | contribs) (added cryptanalysis) |
|||
Line 17: | Line 17: | ||
== Cryptanalysis == | == Cryptanalysis == | ||
− | * | + | * Wilson, Constructing Second Preimages in the WaMM Hash Algorithm. A practical second-preimage attack. Details: [http://web.mit.edu/dwilson/www/hash/wamm.html here] |
Revision as of 10:17, 3 November 2008
1 The algorithm
- Author(s): John Washburn
- Website: http://www.washburnresearch.org/cryptography/index.htm
- Specification:
John Washburn - WAMM: A CANDIDATE ALGORITHM FOR THE SHA-3 COMPETITION
- ,2008
- http://www.washburnresearch.org/cryptography/archive/WaMM-SHA3.pdf
BibtexAuthor : John Washburn
Title : WAMM: A CANDIDATE ALGORITHM FOR THE SHA-3 COMPETITION
In : -
Address :
Date : 2008
2 Cryptanalysis
- Wilson, Constructing Second Preimages in the WaMM Hash Algorithm. A practical second-preimage attack. Details: here