Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

NISTIR 7896

Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition

Date Published: November 2012

Author(s)

Shu-jen Chang (NIST), Ray Perlner (NIST), William Burr (NIST), Meltem Sönmez Turan (NIST), John Kelsey (NIST), Souradyuti Paul (NIST), Lawrence Bassham (NIST)

Abstract

Keywords

Cryptographic hash algorithm; Cryptographic hash function; Cryptography; Cryptographic hash competition; SHA-3 competition; null
Control Families

None selected

Documentation

Publication:
NISTIR 7896 (DOI)
Local Download

Supplemental Material:
None available

Related NIST Publications:
FIPS 202
NISTIR 7764
NISTIR 7620

Topics

Security and Privacy
digital signatures