Difference between revisions of "WaMM"
From The ECRYPT Hash Function Website
Crechberger (talk | contribs) (added cryptanalysis) |
|||
| Line 17: | Line 17: | ||
== Cryptanalysis == | == Cryptanalysis == | ||
| − | + | <bibtex> | |
| + | @misc{wammW08, | ||
| + | author = {David A. Wilson}, | ||
| + | title = {Constructing Second Preimages in the WaMM Hash Algorithm}, | ||
| + | url = {http://web.mit.edu/dwilson/www/hash/wamm.html}, | ||
| + | howpublished = {Available online}, | ||
| + | year = {2008}, | ||
| + | } | ||
| + | </bibtex> | ||
Revision as of 16:42, 25 November 2008
1 The algorithm
- Author(s): John Washburn
- Website: http://www.washburnresearch.org/cryptography/index.htm
- Specification:
John Washburn - WAMM: A CANDIDATE ALGORITHM FOR THE SHA-3 COMPETITION
- ,2008
- http://www.washburnresearch.org/cryptography/archive/WaMM-SHA3.pdf
BibtexAuthor : John Washburn
Title : WAMM: A CANDIDATE ALGORITHM FOR THE SHA-3 COMPETITION
In : -
Address :
Date : 2008
2 Cryptanalysis
David A. Wilson - Constructing Second Preimages in the WaMM Hash Algorithm