WaMM

From The ECRYPT Hash Function Website

1 The algorithm


John Washburn - WAMM: A CANDIDATE ALGORITHM FOR THE SHA-3 COMPETITION

,2008
http://www.washburnresearch.org/cryptography/archive/WaMM-SHA3.pdf
Bibtex
Author : John Washburn
Title : WAMM: A CANDIDATE ALGORITHM FOR THE SHA-3 COMPETITION
In : -
Address :
Date : 2008


2 Cryptanalysis

Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference
collision hash all example - Wilson

A description of this table is given here.


David A. Wilson - Constructing Second Preimages in the WaMM Hash Algorithm

,2008
http://web.mit.edu/dwilson/www/hash/wamm.html
Bibtex
Author : David A. Wilson
Title : Constructing Second Preimages in the WaMM Hash Algorithm
In : -
Address :
Date : 2008