This is a potential security issue, you are being redirected to https://csrc.nist.gov.
The following NIST-authored publications are directly related to this project.
|Series & Number||Title||Status||Released|
|SP 800-185||SHA-3 Derived Functions: cSHAKE, KMAC, TupleHash, and ParallelHash||Final||12/22/2016|
|SP 800-131A Rev. 1||Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths||Withdrawn||11/06/2015|
|FIPS 202||SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions||Final||08/04/2015|
|FIPS 180-4||Secure Hash Standard (SHS)||Final||08/04/2015|
|SP 800-107 Rev. 1||Recommendation for Applications Using Approved Hash Algorithms||Final||08/24/2012|
|FIPS 198-1||The Keyed-Hash Message Authentication Code (HMAC)||Final||07/16/2008|
|FIPS 102||Guideline for Computer Security Certification and Accreditation||Withdrawn||09/27/1983|