Ponic

From The ECRYPT Hash Function Website
Revision as of 18:19, 11 December 2008 by Mschlaeffer (talk | contribs)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to:navigation, search

1 The algorithm

  • Author(s): Peter Schmidt-Nielsen
  • Source: submitted to NIST, improved version


Peter Schmidt-Nielsen - The Ponic Hash Function

,2008
http://ehash.iaik.tugraz.at/uploads/3/3c/PonicSpecification.pdf
Bibtex
Author : Peter Schmidt-Nielsen
Title : The Ponic Hash Function
In : -
Address :
Date : 2008


2 Cryptanalysis

María Naya-Plasencia - Second preimage attack on Ponic

,2008
http://131002.net/data/papers/ponic.pdf
Bibtex
Author : María Naya-Plasencia
Title : Second preimage attack on Ponic
In : -
Address :
Date : 2008
Retrieved from "https://ehash.iaik.tugraz.at/index.php?title=Ponic&oldid=2677"

Navigation menu

Views

  • Page
  • Discussion
  • View source
  • History

Personal tools

  • Log in

Navigation

  • The eHash Main Page
  • Hash Function Zoo
  • SHA-3 Zoo
  • Recent changes
  • Random page
  • Help

 

Tools

  • What links here
  • Related changes
  • Special pages
  • Printable version
  • Permanent link
  • Page information
Powered by MediaWiki
  • Privacy policy
  • About The ECRYPT Hash Function Website
  • Disclaimers