Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

NISTIR 7764

Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competition

Date Published: February 2011

Author(s)

Meltem Sönmez Turan (NIST), Ray Perlner (NIST), Lawrence Bassham (NIST), William Burr (NIST), Donghoon Chang (NIST), Shu-jen Chang (NIST), Morris Dworkin (NIST), John Kelsey (NIST), Souradyuti Paul (NIST), Rene Peralta (NIST)

Abstract

Keywords

cryptographic hash algorithm; cryptographic hash function; cryptographic hash competition; cryptography; SHA-3 competition
Control Families

Configuration Management;

Documentation

Publication:
NISTIR 7764 (DOI)
Local Download

Supplemental Material:
None available

Related NIST Publications:
FIPS 202
NISTIR 7896
NISTIR 7620

Topics

Security and Privacy
digital signatures