From The ECRYPT Hash Function Website

Jump to: navigation, search

1 The algorithm

Jason Lee - HASH 2X
Submission to NIST, 2008
Author : Jason Lee
Title : HASH 2X
In : Submission to NIST -

2 Cryptanalysis

Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference
2nd preimage hash example - Aumasson

A description of this table is given here.

Jean-Philippe Aumasson - Personal communication (second preimage attack)
Reported online, 2008
[Electronic Edition] [Bibtex]
Author : Jean-Philippe Aumasson
Title : Personal communication (second preimage attack)
In : Reported online -
Personal tools