Comparison of cryptographic hash functions: Difference between revisions

Content deleted Content added
No edit summary
Line 262:
! rowspan="2"|Digest<br />size
! rowspan="2"|Rounds
! colspan="3"|Best known attacks<br />RoundsComplexity:rounds<ref group="c">The omitted rounds are full.</ref>:complexity
|-
! [[Birthday attack|Collision]]
Line 271:
| 128
| 48
| [http://www.springerlink.com/content/v6526284mu858v37/ :3]
|
| [http://www.springerlink.com/content/h8q553385534l763/ :2<sup>102</sup>]
|-
| [[MD5]]
| 128
| 64
| [http://eprint.iacr.org/2006/105.pdf :2<sup>29</sup>]
|
| [http://www.springerlink.com/content/q1033484h6t2rj18/ 44:2<sup>96</sup>:44]
|}
=== Notes ===