Difference between revisions of "WaMM"

From The ECRYPT Hash Function Website
(added cryptanalysis)
Line 17: Line 17:
 
== Cryptanalysis ==
 
== Cryptanalysis ==
  
* None yet
+
* Wilson, Constructing Second Preimages in the WaMM Hash Algorithm. A practical second-preimage attack. Details: [http://web.mit.edu/dwilson/www/hash/wamm.html here]

Revision as of 10:17, 3 November 2008

1 The algorithm

John Washburn - WAMM: A CANDIDATE ALGORITHM FOR THE SHA-3 COMPETITION

,2008
http://www.washburnresearch.org/cryptography/archive/WaMM-SHA3.pdf
Bibtex
Author : John Washburn
Title : WAMM: A CANDIDATE ALGORITHM FOR THE SHA-3 COMPETITION
In : -
Address :
Date : 2008

2 Cryptanalysis

  • Wilson, Constructing Second Preimages in the WaMM Hash Algorithm. A practical second-preimage attack. Details: here