On security arguments of the second round SHA-3 candidates

@article{Andreeva2012OnSA,
  title={On security arguments of the second round SHA-3 candidates},
  author={Elena Andreeva and Andrey Bogdanov and Bart Mennink and Bart Preneel and Christian Rechberger},
  journal={International Journal of Information Security},
  year={2012},
  volume={11},
  pages={103-120}
}
In 2007, the US National Institute for Standards and Technology (NIST) announced a call for the design of a new cryptographic hash algorithm in response to vulnerabilities like differential attacks identified in existing hash functions, such as MD5 and SHA-1. NIST received many submissions, 51 of which got accepted to the first round. 14 candidates were left in the second round, out of which five candidates have been recently chosen for the final round. An important criterion in the selection… CONTINUE READING
6 Citations
80 References
Similar Papers

References

Publications referenced by this paper.
Showing 1-10 of 80 references

Similar Papers

Loading similar papers…