From The ECRYPT Hash Function Website

Jump to: navigation, search

1 The algorithm

Björn Fay - MeshHash
Submission to NIST, 2008
[Electronic Edition] [Bibtex]
Author : Björn Fay
Title : MeshHash
In : Submission to NIST -

2 Cryptanalysis

Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference
2nd preimage hash 256 2192 - Thomsen
2nd preimage hash 512 2320 - Thomsen

A description of this table is given here.

Søren S. Thomsen - Second preimage attack on MeshHash
Available online, 2008
[Electronic Edition] [Bibtex]
Author : Søren S. Thomsen
Title : Second preimage attack on MeshHash
In : Available online -
Personal tools