This is a potential security issue, you are being redirected to https://csrc.nist.gov
Drafts for Public Comment
All Public Drafts
Special Publications (SPs)
Security & Privacy
Laws & Regulations
Activities & Products
Computer Security Division
Applied Cybersecurity Division
Hash algorithms specified in FIPS 180-4.
NIST SP 800-107 Rev. 1
Cryptographic hash algorithms specified in [FIPS 180-3].
NIST SP 800-135 Rev. 1
Comments about specific definitions should be sent to the authors of the linked Source publication. For NIST publications, an email is usually found within the document.
Comments about the glossary's presentation and functionality should be sent to firstname.lastname@example.org.
See NISTIR 7298 Rev. 3 for additional details.