Difference between revisions of "N-Hash"
From The ECRYPT Hash Function Website
Latest revision as of 11:54, 3 November 2008
1 Specification
2 Cryptanalysis
2.1 Best Known Results
2.2 Generic Attacks
2.3 Collision Attacks
2.4 Second Preimage Attacks
2.5 Preimage Attacks
2.6 Others