HASH 2X

From The ECRYPT Hash Function Website

1 The algorithm


Jason Lee - HASH 2X

,2008
Bibtex
Author : Jason Lee
Title : HASH 2X
In : -
Address :
Date : 2008


2 Cryptanalysis

Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference
2nd preimage hash example - Aumasson

A description of this table is given here.


Jean-Philippe Aumasson - Personal communication (second preimage attack)

,2008
http://tibasicdev.wikidot.com/archives:hash-2x/comments/show#post-302617
Bibtex
Author : Jean-Philippe Aumasson
Title : Personal communication (second preimage attack)
In : -
Address :
Date : 2008