WaMM

From The ECRYPT Hash Function Website
Revision as of 10:17, 3 November 2008 by Crechberger (talk | contribs) (added cryptanalysis)

1 The algorithm

John Washburn - WAMM: A CANDIDATE ALGORITHM FOR THE SHA-3 COMPETITION

,2008
http://www.washburnresearch.org/cryptography/archive/WaMM-SHA3.pdf
Bibtex
Author : John Washburn
Title : WAMM: A CANDIDATE ALGORITHM FOR THE SHA-3 COMPETITION
In : -
Address :
Date : 2008

2 Cryptanalysis

  • Wilson, Constructing Second Preimages in the WaMM Hash Algorithm. A practical second-preimage attack. Details: here