Ponic

From The ECRYPT Hash Function Website

1 The algorithm


Peter Schmidt-Nielsen - The Ponic Hash Function

,2008
http://ehash.iaik.tugraz.at/uploads/3/3c/PonicSpecification.pdf
Bibtex
Author : Peter Schmidt-Nielsen
Title : The Ponic Hash Function
In : -
Address :
Date : 2008


2 Cryptanalysis

Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference
2nd preimage hash 512 2265 2256 Naya-Plasencia

A description of this table is given here.


María Naya-Plasencia - Second preimage attack on Ponic

,2008
http://131002.net/data/papers/ponic.pdf
Bibtex
Author : María Naya-Plasencia
Title : Second preimage attack on Ponic
In : -
Address :
Date : 2008