Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

NISTIR 7620

Status Report on the First Round of the SHA-3 Cryptographic Hash Algorithm Competition

Date Published: September 2009

Author(s)

Andrew Regenscheid (NIST), Ray Perlner (NIST), Shu-jen Chang (NIST), John Kelsey (NIST), Mridul Nandi (NIST), Souradyuti Paul (NIST)

Abstract

Keywords

cryptographic hash algorithm; cryptographic hash function; cryptography; SHA-3
Control Families

None selected

Documentation

Publication:
NISTIR 7620 (DOI)
Local Download

Supplemental Material:
None available

Related NIST Publications:
ITL Bulletin
FIPS 202
NISTIR 7896
NISTIR 7764
ITL Bulletin
ITL Bulletin
Journal Article

Topics

Security and Privacy
cryptography