Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

FIPS 202

SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

Date Published: August 2015

Author(s)

National Institute of Standards and Technology

Abstract

Keywords

hash algorithm; hash function; information security; message digest; permutation; SHA-3; sponge construction; sponge function; computer security; cryptography; extendable-output function; Federal Information Processing Standard; KECCAK; XOF
Control Families

None selected