From The ECRYPT Hash Function Website

Jump to: navigation, search

1 The algorithm

Peter Schmidt-Nielsen - The Ponic Hash Function
Submission to NIST, 2008
[Electronic Edition] [Bibtex]
Author : Peter Schmidt-Nielsen
Title : The Ponic Hash Function
In : Submission to NIST -

2 Cryptanalysis

Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference
2nd preimage hash 512 2265 2256 Naya-Plasencia

A description of this table is given here.

María Naya-Plasencia - Second preimage attack on Ponic
Available online, 2008
[Electronic Edition] [Bibtex]
Author : María Naya-Plasencia
Title : Second preimage attack on Ponic
In : Available online -
Personal tools