Difference between revisions of "WaMM"
From The ECRYPT Hash Function Website
Crechberger (talk | contribs) (added cryptanalysis) |
|||
Line 17: | Line 17: | ||
== Cryptanalysis == | == Cryptanalysis == | ||
− | + | <bibtex> | |
+ | @misc{wammW08, | ||
+ | author = {David A. Wilson}, | ||
+ | title = {Constructing Second Preimages in the WaMM Hash Algorithm}, | ||
+ | url = {http://web.mit.edu/dwilson/www/hash/wamm.html}, | ||
+ | howpublished = {Available online}, | ||
+ | year = {2008}, | ||
+ | } | ||
+ | </bibtex> |
Revision as of 16:42, 25 November 2008
1 The algorithm
- Author(s): John Washburn
- Website: http://www.washburnresearch.org/cryptography/index.htm
- Specification:
John Washburn - WAMM: A CANDIDATE ALGORITHM FOR THE SHA-3 COMPETITION
- ,2008
- http://www.washburnresearch.org/cryptography/archive/WaMM-SHA3.pdf
BibtexAuthor : John Washburn
Title : WAMM: A CANDIDATE ALGORITHM FOR THE SHA-3 COMPETITION
In : -
Address :
Date : 2008
2 Cryptanalysis
David A. Wilson - Constructing Second Preimages in the WaMM Hash Algorithm