NISTIR 7896 Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition

@inproceedings{Chang2012NISTIR7T,
  title={NISTIR 7896 Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition},
  author={Shu-Jen Chang and Ray A. Perlner and William E. Burr and Meltem S{\"o}nmez Turan and John Kelsey and Souradyuti Paul and Lawrence E. Bassham and Christophe De Canni{\`e}re and Praveen Gauravaram and Dmitry Khovratovich and Willi Meier and Martin Schl{\"a}ffer and S\oren S. Thomsen and Elmar Tischhauser and Deniz Toz and Gilles Van Assche},
  year={2012}
}
iii Abstract The National Institute of Standards and Technology (NIST) opened a public competition on November 2, 2007, to develop a new cryptographic hash algorithm – SHA-3, which will augment the hash algorithms specified in the Federal Information Processing Standard (FIPS) 180-4, Secure Hash Standard (SHS). The competition was NIST's response to advances in the cryptanalysis of hash algorithms. advance to the final round of the competition. Eighteen months were provided for the public… CONTINUE READING
Highly Cited
This paper has 34 citations. REVIEW CITATIONS

From This Paper

Topics from this paper.
23 Citations
117 References
Similar Papers

Citations

Publications citing this paper.
Showing 1-10 of 23 extracted citations

References

Publications referenced by this paper.
Showing 1-10 of 117 references

Processing Multiple Buffers in Parallel to Increase Performance on Intel Architecture Processors

  • V. Gopal, J. Guilford, W. Feghali, E. Ozturk, G. Wolrich, M. Dixon
  • Intel Corporation White Paper, July 2010…
  • 2010
Highly Influential
4 Excerpts

Similar Papers

Loading similar papers…