Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

NISTIR 7620

Status Report on the First Round of the SHA-3 Cryptographic Hash Algorithm Competition

Date Published: September 2009

Author(s)

Andrew Regenscheid (NIST), Ray Perlner (NIST), Shu-jen Chang (NIST), John Kelsey (NIST), Mridul Nandi (NIST), Souradyuti Paul (NIST)

Abstract

Keywords

cryptographic hash algorithm; cryptographic hash function; cryptography; SHA-3
Control Families

None selected

Topics

Security and Privacy
cryptography