Difference between revisions of "WaMM"

From The ECRYPT Hash Function Website
(added cryptanalysis)
Line 17: Line 17:
 
== Cryptanalysis ==
 
== Cryptanalysis ==
  
* Wilson, Constructing Second Preimages in the WaMM Hash Algorithm. A practical second-preimage attack. Details: [http://web.mit.edu/dwilson/www/hash/wamm.html here]
+
<bibtex>
 +
@misc{wammW08,
 +
  author    = {David A. Wilson},
 +
  title    = {Constructing Second Preimages in the WaMM Hash Algorithm},
 +
  url        = {http://web.mit.edu/dwilson/www/hash/wamm.html},
 +
  howpublished = {Available online},
 +
  year      = {2008},
 +
}
 +
</bibtex>

Revision as of 16:42, 25 November 2008