3521:
468:
Several submissions received by NIST were not accepted as first-round candidates, following an internal review by NIST. In general, NIST gave no details as to why each was rejected. NIST also has not given a comprehensive list of rejected algorithms; there are known to be 13, but only the following
100:
Submissions were due
October 31, 2008 and the list of candidates accepted for the first round was published on December 9, 2008. NIST held a conference in late February 2009 where submitters presented their algorithms and NIST officials discussed criteria for narrowing down the field of candidates
282:
The following hash function submissions were accepted for round one but did not pass to round two. They have neither been conceded by the submitters nor have had substantial cryptographic weaknesses. However, most of them have some weaknesses in the design components, or performance issues.
425:
The following round one entrants have been officially retracted from the competition by their submitters; they are considered broken according to the NIST official round one candidates web site. As such, they are withdrawn from the competition.
195:
Security: "We preferred to be conservative about security, and in some cases did not select algorithms with exceptional performance, largely because something about them made us 'nervous,' even though we knew of no clear attack against the full
192:
Performance: "A couple of algorithms were wounded or eliminated by very large area requirement – it seemed that the area they required precluded their use in too much of the potential application space."
222:
The following hash function submissions were accepted for round two, but did not make it to the final round. As noted in the announcement of the finalists, "none of these candidates was clearly broken".
109:, where the second-round candidates were discussed. The announcement of the final round candidates occurred on December 10, 2010. On October 2, 2012, NIST announced its winner, choosing
1003:
Jongin Lim; Donghoon Chang; Seokhie Hong; Changheon Kang; Jinkeon Kang; Jongsung Kim; Changhoon Lee; Jesang Lee; Jongtae Lee; Sangjin Lee; Yuseop Lee; Jaechul Sung (October 29, 2008).
3564:
3501:
3331:
953:; Thomas Icart; Jean-François Misarsky; Marìa Naya-Plasencia; Pascal Paillier; Thomas Pornin; Jean-René Reinhard; Céline Thuillet; Marion Videau (October 28, 2008).
39:
3184:
1655:
1528:
3104:
121:
This is an incomplete list of known submissions. NIST selected 51 entries for round 1. 14 of them advanced to round 2, from which 5 finalists were selected.
2492:
2521:
511:
762:
101:
for Round 2. The list of 14 candidates accepted to Round 2 was published on July 24, 2009. Another conference was held on August 23–24, 2010 (after
3549:
1988:
106:
64:
on
November 2, 2007. "NIST is initiating an effort to develop one or more additional hash algorithms through a public competition, similar to the
2242:
2065:
1133:
3554:
500:
199:
Analysis: "NIST eliminated several algorithms because of the extent of their second-round tweaks or because of a relative lack of reported
65:
838:
102:
3048:
2881:
1106:
3177:
815:
Svein Johan
Knapskog; Danilo Gligoroski; Vlastimil Klima; Mohamed El-Hadedy; Jørn Amundsen; Stig Frode Mjølsnes (November 4, 2008).
870:
Henri
Gilbert; Ryad Benadjila; Olivier Billet; Gilles Macario-Rat; Thomas Peyrin; Matt Robshaw; Yannick Seurin (October 29, 2008).
210:
constructions, and with different internal structures, including ones based on AES, bitslicing, and alternating XOR with addition.
1501:
1603:
2485:
1431:
Danilo
Gligoroski; Rune Steinsmo Ødegård; Marija Mihova; Svein Johan Knapskog; Ljupco Kocarev; Aleš Drápal (November 4, 2008).
3559:
3380:
2526:
2447:
1688:
790:
2876:
1053:
Jacques
Patarin; Louis Goubin; Mickael Ivascot; William Jalby; Olivier Ly; Valerie Nachef; Joana Treger; Emmanuel Volte.
3170:
3094:
324:
89:
69:
3496:
3451:
3264:
2863:
2505:
2501:
2148:
1662:
1535:
3375:
2478:
2394:
79:
The winning hash function has been published as NIST FIPS 202 the "SHA-3 Standard", to complement FIPS 180-4, the
3491:
3120:
2759:
778:
113:, created by Guido Bertoni, Joan Daemen, and Gilles Van Assche of STMicroelectronics and Michaël Peeters of NXP.
1888:
3481:
3471:
3326:
3099:
2935:
2634:
2629:
2097:
377:
297:
816:
1410:
3476:
3466:
3269:
3229:
3222:
3212:
3207:
3022:
2842:
2453:
VHDL source code developed by the
Cryptographic Engineering Research Group (CERG) at George Mason University
1362:
2123:
1913:
3217:
3130:
2516:
2432:
2427:
759:
747:
678:
3524:
3370:
3316:
3145:
2795:
2749:
2639:
2597:
2582:
2564:
1315:
399:
248:
206:
Diversity: The finalists included hashes based on different modes of operation, including the HAIFA and
177:
145:
1992:
1766:"Vortex: A New Family of One Way Hash Functions based on Rijndael Rounds and Carry-less Multiplication"
1240:
1054:
349:
The following non-conceded round one entrants have had substantial cryptographic weaknesses announced:
1786:
Jean-Philippe
Aumasson; Orr Dunkelman; Florian Mendel; Christian Rechberger; Søren S. Thomsen (2009).
654:
3486:
3410:
2815:
2719:
2669:
2644:
2249:
2173:
2072:
302:
270:
81:
1963:
530:
3249:
3140:
3017:
2966:
2905:
2724:
2684:
2664:
921:
235:
2344:
1432:
203:– either tended to create the suspicion that the design might not yet be fully tested and mature."
3355:
3339:
3286:
3074:
3058:
3007:
2592:
505:
161:
1265:
2452:
3415:
3405:
3276:
2951:
1812:
1740:
1029:
631:
359:
3350:
3038:
2992:
2754:
2275:
1316:"Danilo Gligoroski – Cheetah hash function is not resistant against length-extension attack"
1157:
Tetsu Iwata; Kyoji
Shibutani; Taizo Shirai; Shiho Moriai; Toru Akishita (October 31, 2008).
845:
802:
701:
60:
3053:
3002:
2997:
2785:
2457:
2015:
1938:
1863:
1384:
1110:
766:
207:
2322:
2300:
1337:
141:
NIST selected five SHA-3 candidate algorithms to advance to the third (and final) round:
1081:
3425:
3345:
3306:
3254:
3239:
3043:
2771:
2422:
1715:
1290:
1215:
1182:
1004:
979:
791:
Status Report on the second round of the SHA-3 Cryptographic Hash
Algorithm Competition
242:
188:
NIST noted some factors that figured into its selection as it announced the finalists:
181:
2217:
2040:
1838:
1505:
1158:
1030:"Submission to the SHA-3 Competition: The CHI Family of Cryptographic Hash Algorithms"
954:
779:
Status Report on the first round of the SHA-3 Cryptographic Hash Algorithm Competition
17:
3543:
3506:
3461:
3420:
3400:
3296:
3259:
3234:
3135:
3012:
2714:
1607:
946:
896:
407:
200:
43:
1454:
871:
715:
3456:
3301:
3291:
3281:
3244:
3193:
2243:"Algorithm Specification for MIXIT: a SHA-3 Candidate Cryptographic Hash Algorithm"
1578:
1186:
950:
155:
2195:
1560:
1811:
Computer Security Division, Information Technology Laboratory (January 4, 2017).
1692:
559:
3435:
3125:
2971:
2900:
2896:
2805:
1787:
171:
3395:
3365:
3360:
3321:
736:
588:
314:
214:
NIST has released a report explaining its evaluation algorithm-by-algorithm.
3385:
2800:
2437:
2398:
2393:
Nicolas T. Courtois; Carmi Gressel; Avi Hecht; Gregory V. Bard; Ran Granot.
320:
2587:
151:
72:(AES)." The competition ended on October 2, 2012, when NIST announced that
2369:
3430:
3390:
3079:
2976:
2961:
2956:
2946:
2910:
2830:
2744:
2624:
1579:"Hash family LUX – Algorithm Specifications and Supporting Documentation"
955:"Shabal, a Submission to NIST's Cryptographic Hash Algorithm Competition"
920:
Dai Watanabe; Christophe De Canniere; Hisayoshi Sato (October 31, 2008).
231:
1080:
Hirotaka Yoshida; Shoichi Hirose; Hidenori Kuwakado (October 30, 2008).
803:
Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition
2915:
2871:
2649:
1714:
Michael Gorski; Ewan Fleischmann; Christian Forler (October 28, 2008).
1630:
1291:"The Hash Function Cheetah: Specification and Supporting Documentation"
2442:
1289:
Dmitry Khovratovich; Alex Biryukov; Ivica Nikolić (October 30, 2008).
1190:
3311:
3084:
2825:
2820:
2790:
2780:
2739:
2734:
2729:
2709:
2704:
2679:
2674:
2659:
2619:
385:
333:
167:
130:
110:
73:
1989:"SHAMATA hash function: A candidate algorithm for NIST competition"
1191:"Attacks on AURORA-512 and the Double-MIX Merkle–Damgård Transform"
653:
National Institute of Standards and Technology (December 9, 2008).
2810:
2699:
2654:
2602:
2559:
2554:
2548:
2016:"StreamHash Algorithm Specifications and Supporting Documentation"
1765:
1453:
Dmitry Khovratovich; Ivica Nikolić; Ralf-Philipp Weinmann (2008).
589:"NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition"
566:. National Institute of Standards and Technology. November 2, 2007
55:
51:
47:
1529:"ESSENCE: A Candidate Hashing Algorithm for the NIST Competition"
1216:"BLENDER: A Proposed New Family of Cryptographic Hash Algorithms"
88:
The NIST competition has inspired other competitions such as the
2925:
2920:
2891:
2886:
2850:
1058:
737:
NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition
700:
National Institute of Standards and Technology (June 30, 2010).
681:. National Institute for Standards and Technology. July 24, 2009
355:
3166:
2474:
1739:
Florian Mendel; Christian Rechberger; Martin Schläffer (2008).
2694:
2689:
2542:
310:
252:
716:"Tentative Timeline of the Development of New Hash Functions"
949:; Benoît Chevallier-Mames; Christophe Clavier; Thomas Fuhr;
1478:
Sean O'Neil; Karsten Nohl; Luca Henzen (October 31, 2008).
1479:
1241:"Observations and Attacks On The SHA-3 Candidate Blender"
508:– Competition to design authenticated encryption schemes
2124:"Waterfall Hash – Algorithm Specification and Analysis"
2066:"WaMM: A Candidate Algorithm for the SHA-3 Competition"
3332:
Cryptographically secure pseudorandom number generator
1987:
Orhun Kara; Adem Atalay; Ferhat Karakoc; Cevat Manap.
560:"cryptographic hash project – Background Information"
2462:
1028:
Philip Hawkes; Cameron McDonald (October 30, 2008).
3444:
3200:
3113:
3067:
3031:
2985:
2934:
2862:
2839:
2768:
2612:
2573:
2535:
1577:Ivica Nikolić; Alex Biryukov; Dmitry Khovratovich.
1764:Michael Kounavis; Shay Gueron (November 3, 2008).
769:, blog post quoting NIST's announcement in full.
58:. The competition was formally announced in the
1411:"Dynamic SHA2 is vulnerable to generic attacks"
1159:"AURORA: A Cryptographic Hash Algorithm Family"
3565:National Institute of Standards and Technology
2039:Rafael Alvarez; Gary McGuire; Antonio Zamora.
1864:"Design and Primitive Specification for Boole"
1629:Jean-Philippe Aumasson; María Naya-Plasencia.
1363:"Dynamic SHA is vulnerable to generic attacks"
540:. Government Printing Office. November 2, 2007
40:National Institute of Standards and Technology
3178:
2486:
8:
839:"Pseudo-cryptanalysis of Blue Midnight Wish"
2299:Cristophe De Cannière (November 13, 2008).
3185:
3171:
3163:
2493:
2479:
2471:
2467:
2463:
2216:Anne Canteaut & María Naya-Plasencia.
1500:Sebastiaan Indesteege (November 6, 2008).
945:Jean-François Misarsky; Emmanuel Bresson;
626:
512:Post-Quantum Cryptography Standardization
2428:Official list of second round candidates
1105:Kerem Varıcı; Onur Özen; Çelebi Kocair.
673:
671:
624:
622:
620:
618:
616:
614:
612:
610:
608:
606:
2433:Official list of first round candidates
2149:"Official Comment: Waterfall is broken"
1656:"The Sgàil Cryptographic Hash Function"
1527:Jason Worth Martin (October 21, 2008).
1314:Danilo Gligoroski (December 12, 2008).
702:"The Second SHA-3 Candidate Conference"
522:
107:University of California, Santa Barbara
76:would be the new SHA-3 hash algorithm.
38:was an open competition held by the US
2443:Classification of the SHA-3 Candidates
655:"The First SHA-3 Candidate Conference"
583:
581:
2321:Brandon Enright (November 14, 2008).
2218:"Internal collision attack on Maraca"
2098:"Official Comment: WaMM is Withdrawn"
1887:Gregory G. Rose (December 10, 2008).
1409:Vlastimil Klima (December 14, 2008).
1361:Vlastimil Klima (December 14, 2008).
531:"Federal Register / Vol. 72, No. 212"
7:
2172:Bruce Schneier (November 19, 2008).
2147:Bob Hattersley (December 20, 2008).
2014:Michal Trojnara (October 14, 2008).
1912:David A. Wilson (October 23, 2008).
922:"Hash Function Luffa: Specification"
501:Advanced Encryption Standard process
345:Entrants with substantial weaknesses
1214:Colin Bradbury (October 25, 2008).
2122:Bob Hattersly (October 15, 2008).
1939:"A New Hash Algorithm: Khichidi-1"
1716:"The Twister Hash Function Family"
1687:Peter Maxwell (November 5, 2008).
25:
2370:"Second preimage attack on Ponic"
1480:"EnRUPT – The Simpler The Better"
760:SHA-3 Finalists Announced by NIST
564:Computer Security Resource Center
288:ARIRANG (CIST – Korea University)
3520:
3519:
1837:Neil Sholer (October 29, 2008).
1813:"SHA-3 Project – Hash Functions"
1654:Peter Maxwell (September 2008).
895:Özgül Kücük (October 31, 2008).
2276:"NKS 2D Cellular Automata Hash"
1839:"Abacus: A Candidate for SHA-3"
1132:Daniel Penazzi; Miguel Montes.
129:The winner was announced to be
3550:NIST hash function competition
3381:Information-theoretic security
3090:NIST hash function competition
1631:"Second preimages on MCSSHA-3"
748:Third (Final) Round Candidates
36:NIST hash function competition
1:
2458:FIPS 202 – The SHA-3 Standard
980:"The SHAvite-3 Hash Function"
793:(PDF). Retrieved 2 March 2011
3555:Cryptographic hash functions
3095:Password Hashing Competition
2506:message authentication codes
2502:Cryptographic hash functions
2423:NIST website for competition
1266:"Preimage Attack on Blender"
325:Sandia National Laboratories
90:Password Hashing Competition
70:Advanced Encryption Standard
29:Competition to develop SHA-3
3497:Message authentication code
3452:Cryptographic hash function
3265:Cryptographic hash function
3049:Merkle–Damgård construction
218:Did not pass to final round
3581:
3376:Harvest now, decrypt later
2323:"Collisions for NKS2D-512"
2301:"Collisions for NKS2D-224"
2041:"The Tangle Hash Function"
1741:"Cryptanalysis of Twister"
1561:"Cryptanalysis of ESSENCE"
1107:"The Sarmal Hash Function"
1082:"SHA-3 Proposal: Lesamnta"
978:Eli Biham; Orr Dunkelman.
3515:
3492:Post-quantum cryptography
3162:
2512:
2470:
2466:
2196:"Algorithm Specification"
2101:(PDFauthor=John Washburn)
1889:"Official Comment: Boole"
1788:"Cryptanalysis of Vortex"
1604:"MCSSHA-3 hash algorithm"
1455:"Cryptanalysis of Edon-R"
897:"The Hash Function Hamsi"
837:Søren S. Thomsen (2009).
718:. NIST. December 10, 2008
679:"Second Round Candidates"
278:Did not pass to round two
3482:Quantum key distribution
3472:Authenticated encryption
3327:Random number generation
2843:key derivation functions
1937:Natarajan Vijayarangan.
50:to complement the older
42:(NIST) to develop a new
3477:Public-key cryptography
3467:Symmetric-key algorithm
3270:Key derivation function
3230:Cryptographic primitive
3223:Authentication protocol
3213:Outline of cryptography
3208:History of cryptography
3121:Hash-based cryptography
3023:Length extension attack
2343:Peter Schmidt-Nielsen.
1914:"The DCH Hash Function"
1502:"Collisions for EnRUPT"
591:. NIST. October 2, 2012
3218:Cryptographic protocol
3131:Message authentication
2368:María Naya-Plasencia.
2194:Robert J. Jenkins Jr.
2174:"Skein and SHA-3 News"
872:"SHA-3 Proposal: ECHO"
18:NIST SHA-3 competition
3560:Cryptography contests
3371:End-to-end encryption
3317:Cryptojacking malware
1602:Mikhail Maslennikov.
765:July 9, 2011, at the
3487:Quantum cryptography
3411:Trusted timestamping
2448:Hash Function Lounge
1668:on November 12, 2013
1508:on February 18, 2009
851:on September 2, 2009
817:"blue_midnight_wish"
750:Retrieved 9 Nov 2011
133:on October 2, 2012.
82:Secure Hash Standard
3250:Cryptographic nonce
3018:Side-channel attack
2401:on February 9, 2009
2395:"ZK-Crypt Homepage"
2103:. December 20, 2008
1995:on February 1, 2009
1695:on November 9, 2008
1061:on January 29, 2009
66:development process
3356:Subliminal channel
3340:Pseudorandom noise
3287:Key (cryptography)
3075:CAESAR Competition
3059:HAIFA construction
3008:Brute-force attack
2241:Michael P. Frank.
634:. December 9, 2008
506:CAESAR Competition
228:Blue Midnight Wish
3537:
3536:
3533:
3532:
3416:Key-based routing
3406:Trapdoor function
3277:Digital signature
3158:
3157:
3154:
3153:
2952:ChaCha20-Poly1305
2769:Password hashing/
2078:on April 19, 2009
1862:Gregory G. Rose.
464:Rejected entrants
421:Conceded entrants
360:Nagoya University
148:(Aumasson et al.)
16:(Redirected from
3572:
3523:
3522:
3351:Insecure channel
3187:
3180:
3173:
3164:
3039:Avalanche effect
2993:Collision attack
2536:Common functions
2495:
2488:
2481:
2472:
2468:
2464:
2411:
2410:
2408:
2406:
2397:. Archived from
2390:
2384:
2383:
2381:
2379:
2374:
2365:
2359:
2358:
2356:
2354:
2349:
2340:
2334:
2333:
2331:
2329:
2318:
2312:
2311:
2309:
2307:
2296:
2290:
2289:
2287:
2285:
2280:
2271:
2265:
2264:
2262:
2260:
2255:on March 4, 2016
2254:
2248:. Archived from
2247:
2238:
2232:
2231:
2229:
2227:
2222:
2213:
2207:
2206:
2204:
2202:
2191:
2185:
2184:
2182:
2180:
2169:
2163:
2162:
2160:
2158:
2153:
2144:
2138:
2137:
2135:
2133:
2128:
2119:
2113:
2112:
2110:
2108:
2102:
2094:
2088:
2087:
2085:
2083:
2077:
2071:. Archived from
2070:
2061:
2055:
2054:
2052:
2050:
2045:
2036:
2030:
2029:
2027:
2025:
2020:
2011:
2005:
2004:
2002:
2000:
1991:. Archived from
1984:
1978:
1977:
1975:
1973:
1968:
1959:
1953:
1952:
1950:
1948:
1943:
1934:
1928:
1927:
1925:
1923:
1918:
1909:
1903:
1902:
1900:
1898:
1893:
1884:
1878:
1877:
1875:
1873:
1868:
1859:
1853:
1852:
1850:
1848:
1843:
1834:
1828:
1827:
1825:
1823:
1808:
1802:
1801:
1799:
1797:
1792:
1783:
1777:
1776:
1774:
1772:
1761:
1755:
1754:
1752:
1750:
1745:
1736:
1730:
1729:
1727:
1725:
1720:
1711:
1705:
1704:
1702:
1700:
1691:. Archived from
1684:
1678:
1677:
1675:
1673:
1667:
1661:. Archived from
1660:
1651:
1645:
1644:
1642:
1640:
1635:
1626:
1620:
1619:
1617:
1615:
1606:. Archived from
1599:
1593:
1592:
1590:
1588:
1583:
1574:
1568:
1567:
1565:
1557:
1551:
1550:
1548:
1546:
1541:on June 12, 2010
1540:
1534:. Archived from
1533:
1524:
1518:
1517:
1515:
1513:
1504:. Archived from
1497:
1491:
1490:
1488:
1486:
1475:
1469:
1468:
1466:
1464:
1459:
1450:
1444:
1443:
1441:
1439:
1428:
1422:
1421:
1419:
1417:
1406:
1400:
1399:
1397:
1395:
1389:
1380:
1374:
1373:
1371:
1369:
1358:
1352:
1351:
1349:
1347:
1342:
1333:
1327:
1326:
1324:
1322:
1311:
1305:
1304:
1302:
1300:
1295:
1286:
1280:
1279:
1277:
1275:
1270:
1264:Florian Mendel.
1261:
1255:
1254:
1252:
1250:
1245:
1236:
1230:
1229:
1227:
1225:
1220:
1211:
1205:
1204:
1202:
1200:
1195:
1179:
1173:
1172:
1170:
1168:
1163:
1154:
1148:
1147:
1145:
1143:
1138:
1129:
1123:
1122:
1120:
1118:
1113:on June 11, 2011
1109:. Archived from
1102:
1096:
1095:
1093:
1091:
1086:
1077:
1071:
1070:
1068:
1066:
1057:. Archived from
1050:
1044:
1043:
1041:
1039:
1034:
1025:
1019:
1018:
1016:
1014:
1009:
1000:
994:
993:
991:
989:
984:
975:
969:
968:
966:
964:
959:
942:
936:
935:
933:
931:
926:
917:
911:
910:
908:
906:
901:
892:
886:
885:
883:
881:
876:
867:
861:
860:
858:
856:
850:
844:. Archived from
843:
834:
828:
827:
825:
823:
812:
806:
800:
794:
788:
782:
776:
770:
757:
751:
745:
739:
734:
728:
727:
725:
723:
712:
706:
705:
697:
691:
690:
688:
686:
675:
666:
665:
663:
661:
650:
644:
643:
641:
639:
628:
601:
600:
598:
596:
585:
576:
575:
573:
571:
556:
550:
549:
547:
545:
538:Federal Register
535:
527:
61:Federal Register
21:
3580:
3579:
3575:
3574:
3573:
3571:
3570:
3569:
3540:
3539:
3538:
3529:
3511:
3440:
3196:
3191:
3150:
3109:
3068:Standardization
3063:
3054:Sponge function
3027:
3003:Birthday attack
2998:Preimage attack
2981:
2937:
2930:
2858:
2841:
2840:General purpose
2835:
2770:
2764:
2613:Other functions
2608:
2575:SHA-3 finalists
2569:
2531:
2508:
2499:
2419:
2414:
2404:
2402:
2392:
2391:
2387:
2377:
2375:
2372:
2367:
2366:
2362:
2352:
2350:
2347:
2342:
2341:
2337:
2327:
2325:
2320:
2319:
2315:
2305:
2303:
2298:
2297:
2293:
2283:
2281:
2278:
2274:Geoffrey Park.
2273:
2272:
2268:
2258:
2256:
2252:
2245:
2240:
2239:
2235:
2225:
2223:
2220:
2215:
2214:
2210:
2200:
2198:
2193:
2192:
2188:
2178:
2176:
2171:
2170:
2166:
2156:
2154:
2151:
2146:
2145:
2141:
2131:
2129:
2126:
2121:
2120:
2116:
2106:
2104:
2100:
2096:
2095:
2091:
2081:
2079:
2075:
2068:
2064:John Washburn.
2063:
2062:
2058:
2048:
2046:
2043:
2038:
2037:
2033:
2023:
2021:
2018:
2013:
2012:
2008:
1998:
1996:
1986:
1985:
1981:
1971:
1969:
1966:
1961:
1960:
1956:
1946:
1944:
1941:
1936:
1935:
1931:
1921:
1919:
1916:
1911:
1910:
1906:
1896:
1894:
1891:
1886:
1885:
1881:
1871:
1869:
1866:
1861:
1860:
1856:
1846:
1844:
1841:
1836:
1835:
1831:
1821:
1819:
1810:
1809:
1805:
1795:
1793:
1790:
1785:
1784:
1780:
1770:
1768:
1763:
1762:
1758:
1748:
1746:
1743:
1738:
1737:
1733:
1723:
1721:
1718:
1713:
1712:
1708:
1698:
1696:
1686:
1685:
1681:
1671:
1669:
1665:
1658:
1653:
1652:
1648:
1638:
1636:
1633:
1628:
1627:
1623:
1613:
1611:
1601:
1600:
1596:
1586:
1584:
1581:
1576:
1575:
1571:
1563:
1559:
1558:
1554:
1544:
1542:
1538:
1531:
1526:
1525:
1521:
1511:
1509:
1499:
1498:
1494:
1484:
1482:
1477:
1476:
1472:
1462:
1460:
1457:
1452:
1451:
1447:
1437:
1435:
1430:
1429:
1425:
1415:
1413:
1408:
1407:
1403:
1393:
1391:
1387:
1382:
1381:
1377:
1367:
1365:
1360:
1359:
1355:
1345:
1343:
1340:
1335:
1334:
1330:
1320:
1318:
1313:
1312:
1308:
1298:
1296:
1293:
1288:
1287:
1283:
1273:
1271:
1268:
1263:
1262:
1258:
1248:
1246:
1243:
1239:Craig Newbold.
1238:
1237:
1233:
1223:
1221:
1218:
1213:
1212:
1208:
1198:
1196:
1193:
1181:
1180:
1176:
1166:
1164:
1161:
1156:
1155:
1151:
1141:
1139:
1136:
1134:"The TIB3 Hash"
1131:
1130:
1126:
1116:
1114:
1104:
1103:
1099:
1089:
1087:
1084:
1079:
1078:
1074:
1064:
1062:
1052:
1051:
1047:
1037:
1035:
1032:
1027:
1026:
1022:
1012:
1010:
1007:
1002:
1001:
997:
987:
985:
982:
977:
976:
972:
962:
960:
957:
944:
943:
939:
929:
927:
924:
919:
918:
914:
904:
902:
899:
894:
893:
889:
879:
877:
874:
869:
868:
864:
854:
852:
848:
841:
836:
835:
831:
821:
819:
814:
813:
809:
801:
797:
789:
785:
777:
773:
767:Wayback Machine
758:
754:
746:
742:
735:
731:
721:
719:
714:
713:
709:
699:
698:
694:
684:
682:
677:
676:
669:
659:
657:
652:
651:
647:
637:
635:
630:
629:
604:
594:
592:
587:
586:
579:
569:
567:
558:
557:
553:
543:
541:
533:
529:
528:
524:
520:
497:
492:
466:
461:
423:
418:
347:
342:
280:
275:
220:
208:sponge function
139:
127:
119:
98:
30:
23:
22:
15:
12:
11:
5:
3578:
3576:
3568:
3567:
3562:
3557:
3552:
3542:
3541:
3535:
3534:
3531:
3530:
3528:
3527:
3516:
3513:
3512:
3510:
3509:
3504:
3502:Random numbers
3499:
3494:
3489:
3484:
3479:
3474:
3469:
3464:
3459:
3454:
3448:
3446:
3442:
3441:
3439:
3438:
3433:
3428:
3426:Garlic routing
3423:
3418:
3413:
3408:
3403:
3398:
3393:
3388:
3383:
3378:
3373:
3368:
3363:
3358:
3353:
3348:
3346:Secure channel
3343:
3337:
3336:
3335:
3324:
3319:
3314:
3309:
3307:Key stretching
3304:
3299:
3294:
3289:
3284:
3279:
3274:
3273:
3272:
3267:
3257:
3255:Cryptovirology
3252:
3247:
3242:
3240:Cryptocurrency
3237:
3232:
3227:
3226:
3225:
3215:
3210:
3204:
3202:
3198:
3197:
3192:
3190:
3189:
3182:
3175:
3167:
3160:
3159:
3156:
3155:
3152:
3151:
3149:
3148:
3143:
3138:
3133:
3128:
3123:
3117:
3115:
3111:
3110:
3108:
3107:
3102:
3097:
3092:
3087:
3082:
3077:
3071:
3069:
3065:
3064:
3062:
3061:
3056:
3051:
3046:
3044:Hash collision
3041:
3035:
3033:
3029:
3028:
3026:
3025:
3020:
3015:
3010:
3005:
3000:
2995:
2989:
2987:
2983:
2982:
2980:
2979:
2974:
2969:
2964:
2959:
2954:
2949:
2943:
2941:
2932:
2931:
2929:
2928:
2923:
2918:
2913:
2908:
2903:
2894:
2889:
2884:
2879:
2874:
2868:
2866:
2860:
2859:
2857:
2856:
2853:
2847:
2845:
2837:
2836:
2834:
2833:
2828:
2823:
2818:
2813:
2808:
2803:
2798:
2793:
2788:
2783:
2777:
2775:
2772:key stretching
2766:
2765:
2763:
2762:
2757:
2752:
2747:
2742:
2737:
2732:
2727:
2722:
2717:
2712:
2707:
2702:
2697:
2692:
2687:
2682:
2677:
2672:
2667:
2662:
2657:
2652:
2647:
2642:
2637:
2632:
2627:
2622:
2616:
2614:
2610:
2609:
2607:
2606:
2600:
2595:
2590:
2585:
2579:
2577:
2571:
2570:
2568:
2567:
2562:
2557:
2552:
2546:
2539:
2537:
2533:
2532:
2530:
2529:
2524:
2519:
2513:
2510:
2509:
2500:
2498:
2497:
2490:
2483:
2475:
2461:
2460:
2455:
2450:
2445:
2440:
2435:
2430:
2425:
2418:
2417:External links
2415:
2413:
2412:
2385:
2360:
2335:
2313:
2291:
2266:
2233:
2208:
2186:
2164:
2139:
2114:
2089:
2056:
2031:
2006:
1979:
1954:
1929:
1904:
1879:
1854:
1829:
1803:
1778:
1756:
1731:
1706:
1679:
1646:
1621:
1610:on May 2, 2009
1594:
1569:
1552:
1519:
1492:
1470:
1445:
1423:
1401:
1385:"Dynamic SHA2"
1375:
1353:
1328:
1306:
1281:
1256:
1231:
1206:
1183:Niels Ferguson
1174:
1149:
1124:
1097:
1072:
1045:
1020:
995:
970:
937:
912:
887:
862:
829:
807:
795:
783:
771:
752:
740:
729:
707:
692:
667:
645:
602:
577:
551:
521:
519:
516:
515:
514:
509:
503:
496:
493:
491:
490:
487:
484:
481:
478:
475:
471:
465:
462:
460:
459:
456:
453:
450:
447:
444:
441:
438:
435:
432:
428:
422:
419:
417:
416:
413:
410:
405:
402:
397:
394:
391:
388:
383:
380:
375:
372:
369:
366:
363:
351:
346:
343:
341:
340:
337:
331:
328:
318:
308:
305:
300:
295:
292:
289:
285:
279:
276:
274:
273:
268:
265:
262:
259:
256:
246:
243:France Telecom
239:
229:
225:
219:
216:
212:
211:
204:
197:
193:
186:
185:
175:
170:(Keccak team,
165:
159:
149:
138:
135:
126:
123:
118:
115:
97:
94:
28:
24:
14:
13:
10:
9:
6:
4:
3:
2:
3577:
3566:
3563:
3561:
3558:
3556:
3553:
3551:
3548:
3547:
3545:
3526:
3518:
3517:
3514:
3508:
3507:Steganography
3505:
3503:
3500:
3498:
3495:
3493:
3490:
3488:
3485:
3483:
3480:
3478:
3475:
3473:
3470:
3468:
3465:
3463:
3462:Stream cipher
3460:
3458:
3455:
3453:
3450:
3449:
3447:
3443:
3437:
3434:
3432:
3429:
3427:
3424:
3422:
3421:Onion routing
3419:
3417:
3414:
3412:
3409:
3407:
3404:
3402:
3401:Shared secret
3399:
3397:
3394:
3392:
3389:
3387:
3384:
3382:
3379:
3377:
3374:
3372:
3369:
3367:
3364:
3362:
3359:
3357:
3354:
3352:
3349:
3347:
3344:
3341:
3338:
3333:
3330:
3329:
3328:
3325:
3323:
3320:
3318:
3315:
3313:
3310:
3308:
3305:
3303:
3300:
3298:
3297:Key generator
3295:
3293:
3290:
3288:
3285:
3283:
3280:
3278:
3275:
3271:
3268:
3266:
3263:
3262:
3261:
3260:Hash function
3258:
3256:
3253:
3251:
3248:
3246:
3243:
3241:
3238:
3236:
3235:Cryptanalysis
3233:
3231:
3228:
3224:
3221:
3220:
3219:
3216:
3214:
3211:
3209:
3206:
3205:
3203:
3199:
3195:
3188:
3183:
3181:
3176:
3174:
3169:
3168:
3165:
3161:
3147:
3144:
3142:
3139:
3137:
3136:Proof of work
3134:
3132:
3129:
3127:
3124:
3122:
3119:
3118:
3116:
3112:
3106:
3103:
3101:
3098:
3096:
3093:
3091:
3088:
3086:
3083:
3081:
3078:
3076:
3073:
3072:
3070:
3066:
3060:
3057:
3055:
3052:
3050:
3047:
3045:
3042:
3040:
3037:
3036:
3034:
3030:
3024:
3021:
3019:
3016:
3014:
3013:Rainbow table
3011:
3009:
3006:
3004:
3001:
2999:
2996:
2994:
2991:
2990:
2988:
2984:
2978:
2975:
2973:
2970:
2968:
2965:
2963:
2960:
2958:
2955:
2953:
2950:
2948:
2945:
2944:
2942:
2939:
2936:Authenticated
2933:
2927:
2924:
2922:
2919:
2917:
2914:
2912:
2909:
2907:
2904:
2902:
2898:
2895:
2893:
2890:
2888:
2885:
2883:
2880:
2878:
2875:
2873:
2870:
2869:
2867:
2865:
2864:MAC functions
2861:
2854:
2852:
2849:
2848:
2846:
2844:
2838:
2832:
2829:
2827:
2824:
2822:
2819:
2817:
2814:
2812:
2809:
2807:
2804:
2802:
2799:
2797:
2794:
2792:
2789:
2787:
2784:
2782:
2779:
2778:
2776:
2773:
2767:
2761:
2758:
2756:
2753:
2751:
2748:
2746:
2743:
2741:
2738:
2736:
2733:
2731:
2728:
2726:
2723:
2721:
2718:
2716:
2713:
2711:
2708:
2706:
2703:
2701:
2698:
2696:
2693:
2691:
2688:
2686:
2683:
2681:
2678:
2676:
2673:
2671:
2668:
2666:
2663:
2661:
2658:
2656:
2653:
2651:
2648:
2646:
2643:
2641:
2638:
2636:
2633:
2631:
2628:
2626:
2623:
2621:
2618:
2617:
2615:
2611:
2604:
2601:
2599:
2596:
2594:
2591:
2589:
2586:
2584:
2581:
2580:
2578:
2576:
2572:
2566:
2563:
2561:
2558:
2556:
2553:
2551:(compromised)
2550:
2547:
2545:(compromised)
2544:
2541:
2540:
2538:
2534:
2528:
2527:Known attacks
2525:
2523:
2520:
2518:
2515:
2514:
2511:
2507:
2503:
2496:
2491:
2489:
2484:
2482:
2477:
2476:
2473:
2469:
2465:
2459:
2456:
2454:
2451:
2449:
2446:
2444:
2441:
2439:
2436:
2434:
2431:
2429:
2426:
2424:
2421:
2420:
2416:
2400:
2396:
2389:
2386:
2371:
2364:
2361:
2346:
2339:
2336:
2324:
2317:
2314:
2302:
2295:
2292:
2277:
2270:
2267:
2251:
2244:
2237:
2234:
2219:
2212:
2209:
2197:
2190:
2187:
2175:
2168:
2165:
2150:
2143:
2140:
2125:
2118:
2115:
2099:
2093:
2090:
2074:
2067:
2060:
2057:
2042:
2035:
2032:
2017:
2010:
2007:
1994:
1990:
1983:
1980:
1965:
1958:
1955:
1940:
1933:
1930:
1915:
1908:
1905:
1890:
1883:
1880:
1865:
1858:
1855:
1840:
1833:
1830:
1818:
1814:
1807:
1804:
1789:
1782:
1779:
1767:
1760:
1757:
1742:
1735:
1732:
1717:
1710:
1707:
1694:
1690:
1683:
1680:
1664:
1657:
1650:
1647:
1632:
1625:
1622:
1609:
1605:
1598:
1595:
1580:
1573:
1570:
1562:
1556:
1553:
1537:
1530:
1523:
1520:
1507:
1503:
1496:
1493:
1481:
1474:
1471:
1456:
1449:
1446:
1434:
1427:
1424:
1412:
1405:
1402:
1386:
1379:
1376:
1364:
1357:
1354:
1339:
1338:"Dynamic SHA"
1332:
1329:
1317:
1310:
1307:
1292:
1285:
1282:
1267:
1260:
1257:
1242:
1235:
1232:
1217:
1210:
1207:
1192:
1188:
1184:
1178:
1175:
1160:
1153:
1150:
1135:
1128:
1125:
1112:
1108:
1101:
1098:
1083:
1076:
1073:
1060:
1056:
1049:
1046:
1031:
1024:
1021:
1006:
999:
996:
981:
974:
971:
956:
952:
948:
947:Anne Canteaut
941:
938:
923:
916:
913:
898:
891:
888:
873:
866:
863:
847:
840:
833:
830:
818:
811:
808:
804:
799:
796:
792:
787:
784:
780:
775:
772:
768:
764:
761:
756:
753:
749:
744:
741:
738:
733:
730:
722:September 15,
717:
711:
708:
703:
696:
693:
680:
674:
672:
668:
656:
649:
646:
633:
627:
625:
623:
621:
619:
617:
615:
613:
611:
609:
607:
603:
590:
584:
582:
578:
565:
561:
555:
552:
539:
532:
526:
523:
517:
513:
510:
507:
504:
502:
499:
498:
494:
488:
485:
482:
479:
476:
473:
472:
470:
463:
457:
454:
451:
448:
445:
442:
439:
436:
433:
430:
429:
427:
420:
414:
411:
409:
408:Spectral Hash
406:
403:
401:
398:
395:
392:
389:
387:
384:
381:
379:
376:
373:
370:
367:
364:
361:
357:
353:
352:
350:
344:
338:
335:
332:
329:
326:
322:
319:
316:
312:
309:
306:
304:
301:
299:
296:
293:
290:
287:
286:
284:
277:
272:
269:
266:
263:
260:
257:
254:
250:
247:
244:
240:
237:
233:
230:
227:
226:
224:
217:
215:
209:
205:
202:
201:cryptanalysis
198:
194:
191:
190:
189:
183:
179:
176:
173:
169:
166:
163:
160:
157:
153:
150:
147:
144:
143:
142:
136:
134:
132:
124:
122:
116:
114:
112:
108:
105:2010) at the
104:
95:
93:
91:
86:
84:
83:
77:
75:
71:
67:
63:
62:
57:
53:
49:
45:
44:hash function
41:
37:
32:
27:
19:
3457:Block cipher
3302:Key schedule
3292:Key exchange
3282:Kleptography
3245:Cryptosystem
3194:Cryptography
3089:
2574:
2403:. Retrieved
2399:the original
2388:
2378:November 30,
2376:. Retrieved
2363:
2351:. Retrieved
2338:
2328:November 14,
2326:. Retrieved
2316:
2306:November 14,
2304:. Retrieved
2294:
2282:. Retrieved
2269:
2257:. Retrieved
2250:the original
2236:
2226:December 15,
2224:. Retrieved
2211:
2201:December 15,
2199:. Retrieved
2189:
2179:December 23,
2177:. Retrieved
2167:
2157:December 23,
2155:. Retrieved
2142:
2130:. Retrieved
2117:
2107:December 23,
2105:. Retrieved
2092:
2080:. Retrieved
2073:the original
2059:
2049:December 11,
2047:. Retrieved
2034:
2024:December 15,
2022:. Retrieved
2009:
1999:November 10,
1997:. Retrieved
1993:the original
1982:
1972:November 30,
1970:. Retrieved
1957:
1947:December 11,
1945:. Retrieved
1932:
1922:November 23,
1920:. Retrieved
1907:
1897:December 23,
1895:. Retrieved
1882:
1870:. Retrieved
1857:
1847:December 11,
1845:. Retrieved
1832:
1820:. Retrieved
1816:
1806:
1794:. Retrieved
1781:
1771:November 11,
1769:. Retrieved
1759:
1747:. Retrieved
1734:
1724:December 11,
1722:. Retrieved
1709:
1697:. Retrieved
1693:the original
1689:"Aww, p*sh!"
1682:
1670:. Retrieved
1663:the original
1649:
1639:November 14,
1637:. Retrieved
1624:
1612:. Retrieved
1608:the original
1597:
1587:December 11,
1585:. Retrieved
1572:
1555:
1543:. Retrieved
1536:the original
1522:
1510:. Retrieved
1506:the original
1495:
1485:November 10,
1483:. Retrieved
1473:
1461:. Retrieved
1448:
1438:November 10,
1436:. Retrieved
1426:
1416:December 21,
1414:. Retrieved
1404:
1394:December 11,
1392:. Retrieved
1378:
1368:December 21,
1366:. Retrieved
1356:
1346:December 11,
1344:. Retrieved
1331:
1321:December 21,
1319:. Retrieved
1309:
1299:December 11,
1297:. Retrieved
1284:
1274:December 23,
1272:. Retrieved
1259:
1249:December 23,
1247:. Retrieved
1234:
1224:December 11,
1222:. Retrieved
1209:
1197:. Retrieved
1187:Stefan Lucks
1177:
1167:December 11,
1165:. Retrieved
1152:
1142:November 29,
1140:. Retrieved
1127:
1115:. Retrieved
1111:the original
1100:
1090:December 11,
1088:. Retrieved
1075:
1065:November 14,
1063:. Retrieved
1059:the original
1048:
1038:November 11,
1036:. Retrieved
1023:
1013:December 11,
1011:. Retrieved
998:
988:December 11,
986:. Retrieved
973:
963:December 11,
961:. Retrieved
951:Aline Gouget
940:
930:December 11,
928:. Retrieved
915:
905:December 11,
903:. Retrieved
890:
880:December 11,
878:. Retrieved
865:
853:. Retrieved
846:the original
832:
822:November 10,
820:. Retrieved
810:
798:
786:
774:
755:
743:
732:
720:. Retrieved
710:
695:
683:. Retrieved
660:December 23,
658:. Retrieved
648:
638:December 10,
636:. Retrieved
593:. Retrieved
568:. Retrieved
563:
554:
542:. Retrieved
537:
525:
469:are public.
467:
424:
374:Dynamic SHA2
348:
281:
221:
213:
187:
164:(Hongjun Wu)
140:
128:
120:
99:
87:
80:
78:
59:
35:
33:
31:
26:
3445:Mathematics
3436:Mix network
3126:Merkle tree
3114:Utilization
3100:NSA Suite B
2353:November 9,
2284:November 9,
2259:January 12,
2132:November 9,
2082:November 9,
1962:Björn Fay.
1872:November 8,
1699:November 6,
1672:November 9,
1614:November 8,
1545:November 8,
1512:November 7,
1117:October 12,
570:November 6,
544:November 6,
371:Dynamic SHA
196:algorithm."
3544:Categories
3396:Ciphertext
3366:Decryption
3361:Encryption
3322:Ransomware
2938:encryption
2715:RadioGatún
2522:Comparison
1964:"MeshHash"
1817:CSRC: NIST
1383:Zijie Xu.
1336:Zijie Xu.
595:October 2,
518:References
449:StreamHash
440:Khichidi-1
3386:Plaintext
2855:KDF1/KDF2
2774:functions
2760:Whirlpool
2438:SHA-3 Zoo
1822:April 26,
1005:"ARIRANG"
632:"Round 1"
458:Waterfall
321:SANDstorm
267:SHAvite-3
236:Bernstein
137:Finalists
3525:Category
3431:Kademlia
3391:Codetext
3334:(CSPRNG)
3080:CRYPTREC
2911:Poly1305
2831:yescrypt
2745:Streebog
2625:CubeHash
2605:(winner)
2405:March 1,
1463:July 10,
1433:"edon-r"
1199:July 10,
1189:(2009).
1055:"CRUNCH"
763:Archived
685:July 24,
495:See also
489:ZK-Crypt
443:MeshHash
396:MCSSHA-3
354:AURORA (
307:Lesamnta
232:CubeHash
182:Schneier
117:Entrants
68:for the
3201:General
2986:Attacks
2916:SipHash
2872:CBC-MAC
2806:LM hash
2786:Balloon
2650:HAS-160
2345:"Ponic"
1796:May 19,
1749:May 19,
855:May 19,
474:HASH 2X
446:SHAMATA
412:Twister
390:ESSENCE
368:Cheetah
365:Blender
317:et al.)
184:et al.)
174:et al.)
158:et al.)
156:Knudsen
96:Process
46:called
3312:Keygen
3146:Pepper
3085:NESSIE
3032:Design
2826:scrypt
2821:PBKDF2
2796:Catena
2791:bcrypt
2781:Argon2
2740:Snefru
2735:Shabal
2730:SWIFFT
2710:RIPEMD
2705:N-hash
2680:MASH-2
2675:MASH-1
2660:Kupyna
2620:BLAKE3
2603:Keccak
2588:Grøstl
2565:BLAKE2
1390:. NIST
805:(PDF).
781:(PDF).
483:NKS 2D
477:Maraca
452:Tangle
431:Abacus
415:Vortex
386:EnRUPT
382:Edon-R
334:SWIFFT
330:Sarmal
315:Rivest
294:CRUNCH
264:Shabal
241:ECHO (
172:Daemen
168:Keccak
152:Grøstl
131:Keccak
125:Winner
111:Keccak
103:CRYPTO
74:Keccak
3342:(PRN)
2940:modes
2816:Makwa
2811:Lyra2
2801:crypt
2750:Tiger
2700:MDC-2
2655:HAVAL
2640:Fugue
2598:Skein
2583:BLAKE
2560:SHA-3
2555:SHA-2
2549:SHA-1
2373:(PDF)
2348:(PDF)
2279:(PDF)
2253:(PDF)
2246:(PDF)
2221:(PDF)
2152:(PDF)
2127:(PDF)
2076:(PDF)
2069:(PDF)
2044:(PDF)
2019:(PDF)
1967:(PDF)
1942:(PDF)
1917:(PDF)
1892:(PDF)
1867:(PDF)
1842:(PDF)
1791:(PDF)
1744:(PDF)
1719:(PDF)
1666:(PDF)
1659:(PDF)
1634:(PDF)
1582:(PDF)
1564:(PDF)
1539:(PDF)
1532:(PDF)
1458:(PDF)
1388:(PDF)
1341:(PDF)
1294:(PDF)
1269:(PDF)
1244:(PDF)
1219:(PDF)
1194:(PDF)
1162:(PDF)
1137:(PDF)
1085:(PDF)
1033:(PDF)
1008:(PDF)
983:(PDF)
958:(PDF)
925:(PDF)
900:(PDF)
875:(PDF)
849:(PDF)
842:(PDF)
534:(PDF)
486:Ponic
480:MIXIT
434:Boole
404:Sgàil
400:NaSHA
261:Luffa
258:Hamsi
249:Fugue
178:Skein
146:BLAKE
56:SHA-2
52:SHA-1
48:SHA-3
3141:Salt
3105:CNSA
2972:IAPM
2926:VMAC
2921:UMAC
2906:PMAC
2901:CMAC
2897:OMAC
2892:NMAC
2887:HMAC
2882:GMAC
2851:HKDF
2720:SIMD
2670:Lane
2645:GOST
2630:ECOH
2517:List
2504:and
2407:2009
2380:2008
2355:2008
2330:2008
2308:2008
2286:2008
2261:2014
2228:2008
2203:2008
2181:2008
2159:2008
2134:2008
2109:2008
2084:2008
2051:2008
2026:2008
2001:2008
1974:2008
1949:2008
1924:2008
1899:2008
1874:2008
1849:2008
1824:2019
1798:2009
1773:2008
1751:2009
1726:2008
1701:2008
1674:2008
1641:2008
1616:2008
1589:2008
1547:2008
1514:2008
1487:2008
1465:2009
1440:2008
1418:2008
1396:2008
1370:2008
1348:2008
1323:2008
1301:2008
1276:2008
1251:2008
1226:2008
1201:2009
1169:2008
1144:2008
1119:2010
1092:2008
1067:2008
1040:2008
1015:2008
990:2008
965:2008
932:2008
907:2008
882:2008
857:2009
824:2008
724:2009
687:2009
662:2008
640:2008
597:2012
572:2008
546:2008
455:WaMM
378:ECOH
358:and
356:Sony
339:TIB3
303:Lane
271:SIMD
54:and
34:The
2977:OCB
2967:GCM
2962:EAX
2957:CWC
2947:CCM
2877:DAA
2755:VSH
2725:SM3
2695:MD6
2690:MD4
2685:MD2
2665:LSH
2635:FSB
2543:MD5
437:DCH
393:LUX
311:MD6
298:FSB
291:CHI
253:IBM
3546::
2593:JH
1815:.
1185:;
670:^
605:^
580:^
562:.
536:.
162:JH
92:.
85:.
3186:e
3179:t
3172:v
2899:/
2494:e
2487:t
2480:v
2409:.
2382:.
2357:.
2332:.
2310:.
2288:.
2263:.
2230:.
2205:.
2183:.
2161:.
2136:.
2111:.
2086:.
2053:.
2028:.
2003:.
1976:.
1951:.
1926:.
1901:.
1876:.
1851:.
1826:.
1800:.
1775:.
1753:.
1728:.
1703:.
1676:.
1643:.
1618:.
1591:.
1566:.
1549:.
1516:.
1489:.
1467:.
1442:.
1420:.
1398:.
1372:.
1350:.
1325:.
1303:.
1278:.
1253:.
1228:.
1203:.
1171:.
1146:.
1121:.
1094:.
1069:.
1042:.
1017:.
992:.
967:.
934:.
909:.
884:.
859:.
826:.
726:.
704:.
689:.
664:.
642:.
599:.
574:.
548:.
362:)
336:X
327:)
323:(
313:(
255:)
251:(
245:)
238:)
234:(
180:(
154:(
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.