HASH 2X
From The ECRYPT Hash Function Website
1 The algorithm
- Author(s): Jason Lee
- Website: http://tibasicdev.wikidot.com/archives:hash-2x
Jason Lee - HASH 2X
2 Cryptanalysis
Type of Analysis | Hash Function Part | Hash Size (n) | Parameters/Variants | Compression Function Calls | Memory Requirements | Reference |
2nd preimage | hash | example | - | Aumasson |
A description of this table is given here.
Jean-Philippe Aumasson - Personal communication (second preimage attack)