Knowledge (XXG)

NIST hash function competition

Source 📝

3521: 468:
Several submissions received by NIST were not accepted as first-round candidates, following an internal review by NIST. In general, NIST gave no details as to why each was rejected. NIST also has not given a comprehensive list of rejected algorithms; there are known to be 13, but only the following
100:
Submissions were due October 31, 2008 and the list of candidates accepted for the first round was published on December 9, 2008. NIST held a conference in late February 2009 where submitters presented their algorithms and NIST officials discussed criteria for narrowing down the field of candidates
282:
The following hash function submissions were accepted for round one but did not pass to round two. They have neither been conceded by the submitters nor have had substantial cryptographic weaknesses. However, most of them have some weaknesses in the design components, or performance issues.
425:
The following round one entrants have been officially retracted from the competition by their submitters; they are considered broken according to the NIST official round one candidates web site. As such, they are withdrawn from the competition.
195:
Security: "We preferred to be conservative about security, and in some cases did not select algorithms with exceptional performance, largely because something about them made us 'nervous,' even though we knew of no clear attack against the full
192:
Performance: "A couple of algorithms were wounded or eliminated by very large area requirement – it seemed that the area they required precluded their use in too much of the potential application space."
222:
The following hash function submissions were accepted for round two, but did not make it to the final round. As noted in the announcement of the finalists, "none of these candidates was clearly broken".
109:, where the second-round candidates were discussed. The announcement of the final round candidates occurred on December 10, 2010. On October 2, 2012, NIST announced its winner, choosing 1003:
Jongin Lim; Donghoon Chang; Seokhie Hong; Changheon Kang; Jinkeon Kang; Jongsung Kim; Changhoon Lee; Jesang Lee; Jongtae Lee; Sangjin Lee; Yuseop Lee; Jaechul Sung (October 29, 2008).
3564: 3501: 3331: 953:; Thomas Icart; Jean-François Misarsky; Marìa Naya-Plasencia; Pascal Paillier; Thomas Pornin; Jean-René Reinhard; Céline Thuillet; Marion Videau (October 28, 2008). 39: 3184: 1655: 1528: 3104: 121:
This is an incomplete list of known submissions. NIST selected 51 entries for round 1. 14 of them advanced to round 2, from which 5 finalists were selected.
2492: 2521: 511: 762: 101:
for Round 2. The list of 14 candidates accepted to Round 2 was published on July 24, 2009. Another conference was held on August 23–24, 2010 (after
3549: 1988: 106: 64:
on November 2, 2007. "NIST is initiating an effort to develop one or more additional hash algorithms through a public competition, similar to the
2242: 2065: 1133: 3554: 500: 199:
Analysis: "NIST eliminated several algorithms because of the extent of their second-round tweaks or because of a relative lack of reported
65: 838: 102: 3048: 2881: 1106: 3177: 815:
Svein Johan Knapskog; Danilo Gligoroski; Vlastimil Klima; Mohamed El-Hadedy; Jørn Amundsen; Stig Frode Mjølsnes (November 4, 2008).
870:
Henri Gilbert; Ryad Benadjila; Olivier Billet; Gilles Macario-Rat; Thomas Peyrin; Matt Robshaw; Yannick Seurin (October 29, 2008).
210:
constructions, and with different internal structures, including ones based on AES, bitslicing, and alternating XOR with addition.
1501: 1603: 2485: 1431:
Danilo Gligoroski; Rune Steinsmo Ødegård; Marija Mihova; Svein Johan Knapskog; Ljupco Kocarev; Aleš Drápal (November 4, 2008).
3559: 3380: 2526: 2447: 1688: 790: 2876: 1053:
Jacques Patarin; Louis Goubin; Mickael Ivascot; William Jalby; Olivier Ly; Valerie Nachef; Joana Treger; Emmanuel Volte.
3170: 3094: 324: 89: 69: 3496: 3451: 3264: 2863: 2505: 2501: 2148: 1662: 1535: 3375: 2478: 2394: 79:
The winning hash function has been published as NIST FIPS 202 the "SHA-3 Standard", to complement FIPS 180-4, the
3491: 3120: 2759: 778: 113:, created by Guido Bertoni, Joan Daemen, and Gilles Van Assche of STMicroelectronics and Michaël Peeters of NXP. 1888: 3481: 3471: 3326: 3099: 2935: 2634: 2629: 2097: 377: 297: 816: 1410: 3476: 3466: 3269: 3229: 3222: 3212: 3207: 3022: 2842: 2453:
VHDL source code developed by the Cryptographic Engineering Research Group (CERG) at George Mason University
1362: 2123: 1913: 3217: 3130: 2516: 2432: 2427: 759: 747: 678: 3524: 3370: 3316: 3145: 2795: 2749: 2639: 2597: 2582: 2564: 1315: 399: 248: 206:
Diversity: The finalists included hashes based on different modes of operation, including the HAIFA and
177: 145: 1992: 1766:"Vortex: A New Family of One Way Hash Functions based on Rijndael Rounds and Carry-less Multiplication" 1240: 1054: 349:
The following non-conceded round one entrants have had substantial cryptographic weaknesses announced:
1786:
Jean-Philippe Aumasson; Orr Dunkelman; Florian Mendel; Christian Rechberger; Søren S. Thomsen (2009).
654: 3486: 3410: 2815: 2719: 2669: 2644: 2249: 2173: 2072: 302: 270: 81: 1963: 530: 3249: 3140: 3017: 2966: 2905: 2724: 2684: 2664: 921: 235: 2344: 1432: 203:– either tended to create the suspicion that the design might not yet be fully tested and mature." 3355: 3339: 3286: 3074: 3058: 3007: 2592: 505: 161: 1265: 2452: 3415: 3405: 3276: 2951: 1812: 1740: 1029: 631: 359: 3350: 3038: 2992: 2754: 2275: 1316:"Danilo Gligoroski – Cheetah hash function is not resistant against length-extension attack" 1157:
Tetsu Iwata; Kyoji Shibutani; Taizo Shirai; Shiho Moriai; Toru Akishita (October 31, 2008).
845: 802: 701: 60: 3053: 3002: 2997: 2785: 2457: 2015: 1938: 1863: 1384: 1110: 766: 207: 2322: 2300: 1337: 141:
NIST selected five SHA-3 candidate algorithms to advance to the third (and final) round:
1081: 3425: 3345: 3306: 3254: 3239: 3043: 2771: 2422: 1715: 1290: 1215: 1182: 1004: 979: 791:
Status Report on the second round of the SHA-3 Cryptographic Hash Algorithm Competition
242: 188:
NIST noted some factors that figured into its selection as it announced the finalists:
181: 2217: 2040: 1838: 1505: 1158: 1030:"Submission to the SHA-3 Competition: The CHI Family of Cryptographic Hash Algorithms" 954: 779:
Status Report on the first round of the SHA-3 Cryptographic Hash Algorithm Competition
17: 3543: 3506: 3461: 3420: 3400: 3296: 3259: 3234: 3135: 3012: 2714: 1607: 946: 896: 407: 200: 43: 1454: 871: 715: 3456: 3301: 3291: 3281: 3244: 3193: 2243:"Algorithm Specification for MIXIT: a SHA-3 Candidate Cryptographic Hash Algorithm" 1578: 1186: 950: 155: 2195: 1560: 1811:
Computer Security Division, Information Technology Laboratory (January 4, 2017).
1692: 559: 3435: 3125: 2971: 2900: 2896: 2805: 1787: 171: 3395: 3365: 3360: 3321: 736: 588: 314: 214:
NIST has released a report explaining its evaluation algorithm-by-algorithm.
3385: 2800: 2437: 2398: 2393:
Nicolas T. Courtois; Carmi Gressel; Avi Hecht; Gregory V. Bard; Ran Granot.
320: 2587: 151: 72:(AES)." The competition ended on October 2, 2012, when NIST announced that 2369: 3430: 3390: 3079: 2976: 2961: 2956: 2946: 2910: 2830: 2744: 2624: 1579:"Hash family LUX – Algorithm Specifications and Supporting Documentation" 955:"Shabal, a Submission to NIST's Cryptographic Hash Algorithm Competition" 920:
Dai Watanabe; Christophe De Canniere; Hisayoshi Sato (October 31, 2008).
231: 1080:
Hirotaka Yoshida; Shoichi Hirose; Hidenori Kuwakado (October 30, 2008).
803:
Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition
2915: 2871: 2649: 1714:
Michael Gorski; Ewan Fleischmann; Christian Forler (October 28, 2008).
1630: 1291:"The Hash Function Cheetah: Specification and Supporting Documentation" 2442: 1289:
Dmitry Khovratovich; Alex Biryukov; Ivica Nikolić (October 30, 2008).
1190: 3311: 3084: 2825: 2820: 2790: 2780: 2739: 2734: 2729: 2709: 2704: 2679: 2674: 2659: 2619: 385: 333: 167: 130: 110: 73: 1989:"SHAMATA hash function: A candidate algorithm for NIST competition" 1191:"Attacks on AURORA-512 and the Double-MIX Merkle–Damgård Transform" 653:
National Institute of Standards and Technology (December 9, 2008).
2810: 2699: 2654: 2602: 2559: 2554: 2548: 2016:"StreamHash Algorithm Specifications and Supporting Documentation" 1765: 1453:
Dmitry Khovratovich; Ivica Nikolić; Ralf-Philipp Weinmann (2008).
589:"NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition" 566:. National Institute of Standards and Technology. November 2, 2007 55: 51: 47: 1529:"ESSENCE: A Candidate Hashing Algorithm for the NIST Competition" 1216:"BLENDER: A Proposed New Family of Cryptographic Hash Algorithms" 88:
The NIST competition has inspired other competitions such as the
2925: 2920: 2891: 2886: 2850: 1058: 737:
NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition
700:
National Institute of Standards and Technology (June 30, 2010).
681:. National Institute for Standards and Technology. July 24, 2009 355: 3166: 2474: 1739:
Florian Mendel; Christian Rechberger; Martin Schläffer (2008).
2694: 2689: 2542: 310: 252: 716:"Tentative Timeline of the Development of New Hash Functions" 949:; Benoît Chevallier-Mames; Christophe Clavier; Thomas Fuhr; 1478:
Sean O'Neil; Karsten Nohl; Luca Henzen (October 31, 2008).
1479: 1241:"Observations and Attacks On The SHA-3 Candidate Blender" 508:– Competition to design authenticated encryption schemes 2124:"Waterfall Hash – Algorithm Specification and Analysis" 2066:"WaMM: A Candidate Algorithm for the SHA-3 Competition" 3332:
Cryptographically secure pseudorandom number generator
1987:
Orhun Kara; Adem Atalay; Ferhat Karakoc; Cevat Manap.
560:"cryptographic hash project – Background Information" 2462: 1028:
Philip Hawkes; Cameron McDonald (October 30, 2008).
3444: 3200: 3113: 3067: 3031: 2985: 2934: 2862: 2839: 2768: 2612: 2573: 2535: 1577:Ivica Nikolić; Alex Biryukov; Dmitry Khovratovich. 1764:Michael Kounavis; Shay Gueron (November 3, 2008). 769:, blog post quoting NIST's announcement in full. 58:. The competition was formally announced in the 1411:"Dynamic SHA2 is vulnerable to generic attacks" 1159:"AURORA: A Cryptographic Hash Algorithm Family" 3565:National Institute of Standards and Technology 2039:Rafael Alvarez; Gary McGuire; Antonio Zamora. 1864:"Design and Primitive Specification for Boole" 1629:Jean-Philippe Aumasson; María Naya-Plasencia. 1363:"Dynamic SHA is vulnerable to generic attacks" 540:. Government Printing Office. November 2, 2007 40:National Institute of Standards and Technology 3178: 2486: 8: 839:"Pseudo-cryptanalysis of Blue Midnight Wish" 2299:Cristophe De Cannière (November 13, 2008). 3185: 3171: 3163: 2493: 2479: 2471: 2467: 2463: 2216:Anne Canteaut & María Naya-Plasencia. 1500:Sebastiaan Indesteege (November 6, 2008). 945:Jean-François Misarsky; Emmanuel Bresson; 626: 512:Post-Quantum Cryptography Standardization 2428:Official list of second round candidates 1105:Kerem Varıcı; Onur Özen; Çelebi Kocair. 673: 671: 624: 622: 620: 618: 616: 614: 612: 610: 608: 606: 2433:Official list of first round candidates 2149:"Official Comment: Waterfall is broken" 1656:"The Sgàil Cryptographic Hash Function" 1527:Jason Worth Martin (October 21, 2008). 1314:Danilo Gligoroski (December 12, 2008). 702:"The Second SHA-3 Candidate Conference" 522: 107:University of California, Santa Barbara 76:would be the new SHA-3 hash algorithm. 38:was an open competition held by the US 2443:Classification of the SHA-3 Candidates 655:"The First SHA-3 Candidate Conference" 583: 581: 2321:Brandon Enright (November 14, 2008). 2218:"Internal collision attack on Maraca" 2098:"Official Comment: WaMM is Withdrawn" 1887:Gregory G. Rose (December 10, 2008). 1409:Vlastimil Klima (December 14, 2008). 1361:Vlastimil Klima (December 14, 2008). 531:"Federal Register / Vol. 72, No. 212" 7: 2172:Bruce Schneier (November 19, 2008). 2147:Bob Hattersley (December 20, 2008). 2014:Michal Trojnara (October 14, 2008). 1912:David A. Wilson (October 23, 2008). 922:"Hash Function Luffa: Specification" 501:Advanced Encryption Standard process 345:Entrants with substantial weaknesses 1214:Colin Bradbury (October 25, 2008). 2122:Bob Hattersly (October 15, 2008). 1939:"A New Hash Algorithm: Khichidi-1" 1716:"The Twister Hash Function Family" 1687:Peter Maxwell (November 5, 2008). 25: 2370:"Second preimage attack on Ponic" 1480:"EnRUPT – The Simpler The Better" 760:SHA-3 Finalists Announced by NIST 564:Computer Security Resource Center 288:ARIRANG (CIST – Korea University) 3520: 3519: 1837:Neil Sholer (October 29, 2008). 1813:"SHA-3 Project – Hash Functions" 1654:Peter Maxwell (September 2008). 895:Özgül Kücük (October 31, 2008). 2276:"NKS 2D Cellular Automata Hash" 1839:"Abacus: A Candidate for SHA-3" 1132:Daniel Penazzi; Miguel Montes. 129:The winner was announced to be 3550:NIST hash function competition 3381:Information-theoretic security 3090:NIST hash function competition 1631:"Second preimages on MCSSHA-3" 748:Third (Final) Round Candidates 36:NIST hash function competition 1: 2458:FIPS 202 – The SHA-3 Standard 980:"The SHAvite-3 Hash Function" 793:(PDF). Retrieved 2 March 2011 3555:Cryptographic hash functions 3095:Password Hashing Competition 2506:message authentication codes 2502:Cryptographic hash functions 2423:NIST website for competition 1266:"Preimage Attack on Blender" 325:Sandia National Laboratories 90:Password Hashing Competition 70:Advanced Encryption Standard 29:Competition to develop SHA-3 3497:Message authentication code 3452:Cryptographic hash function 3265:Cryptographic hash function 3049:Merkle–Damgård construction 218:Did not pass to final round 3581: 3376:Harvest now, decrypt later 2323:"Collisions for NKS2D-512" 2301:"Collisions for NKS2D-224" 2041:"The Tangle Hash Function" 1741:"Cryptanalysis of Twister" 1561:"Cryptanalysis of ESSENCE" 1107:"The Sarmal Hash Function" 1082:"SHA-3 Proposal: Lesamnta" 978:Eli Biham; Orr Dunkelman. 3515: 3492:Post-quantum cryptography 3162: 2512: 2470: 2466: 2196:"Algorithm Specification" 2101:(PDFauthor=John Washburn) 1889:"Official Comment: Boole" 1788:"Cryptanalysis of Vortex" 1604:"MCSSHA-3 hash algorithm" 1455:"Cryptanalysis of Edon-R" 897:"The Hash Function Hamsi" 837:Søren S. Thomsen (2009). 718:. NIST. December 10, 2008 679:"Second Round Candidates" 278:Did not pass to round two 3482:Quantum key distribution 3472:Authenticated encryption 3327:Random number generation 2843:key derivation functions 1937:Natarajan Vijayarangan. 50:to complement the older 42:(NIST) to develop a new 3477:Public-key cryptography 3467:Symmetric-key algorithm 3270:Key derivation function 3230:Cryptographic primitive 3223:Authentication protocol 3213:Outline of cryptography 3208:History of cryptography 3121:Hash-based cryptography 3023:Length extension attack 2343:Peter Schmidt-Nielsen. 1914:"The DCH Hash Function" 1502:"Collisions for EnRUPT" 591:. NIST. October 2, 2012 3218:Cryptographic protocol 3131:Message authentication 2368:María Naya-Plasencia. 2194:Robert J. Jenkins Jr. 2174:"Skein and SHA-3 News" 872:"SHA-3 Proposal: ECHO" 18:NIST SHA-3 competition 3560:Cryptography contests 3371:End-to-end encryption 3317:Cryptojacking malware 1602:Mikhail Maslennikov. 765:July 9, 2011, at the 3487:Quantum cryptography 3411:Trusted timestamping 2448:Hash Function Lounge 1668:on November 12, 2013 1508:on February 18, 2009 851:on September 2, 2009 817:"blue_midnight_wish" 750:Retrieved 9 Nov 2011 133:on October 2, 2012. 82:Secure Hash Standard 3250:Cryptographic nonce 3018:Side-channel attack 2401:on February 9, 2009 2395:"ZK-Crypt Homepage" 2103:. December 20, 2008 1995:on February 1, 2009 1695:on November 9, 2008 1061:on January 29, 2009 66:development process 3356:Subliminal channel 3340:Pseudorandom noise 3287:Key (cryptography) 3075:CAESAR Competition 3059:HAIFA construction 3008:Brute-force attack 2241:Michael P. Frank. 634:. December 9, 2008 506:CAESAR Competition 228:Blue Midnight Wish 3537: 3536: 3533: 3532: 3416:Key-based routing 3406:Trapdoor function 3277:Digital signature 3158: 3157: 3154: 3153: 2952:ChaCha20-Poly1305 2769:Password hashing/ 2078:on April 19, 2009 1862:Gregory G. Rose. 464:Rejected entrants 421:Conceded entrants 360:Nagoya University 148:(Aumasson et al.) 16:(Redirected from 3572: 3523: 3522: 3351:Insecure channel 3187: 3180: 3173: 3164: 3039:Avalanche effect 2993:Collision attack 2536:Common functions 2495: 2488: 2481: 2472: 2468: 2464: 2411: 2410: 2408: 2406: 2397:. Archived from 2390: 2384: 2383: 2381: 2379: 2374: 2365: 2359: 2358: 2356: 2354: 2349: 2340: 2334: 2333: 2331: 2329: 2318: 2312: 2311: 2309: 2307: 2296: 2290: 2289: 2287: 2285: 2280: 2271: 2265: 2264: 2262: 2260: 2255:on March 4, 2016 2254: 2248:. Archived from 2247: 2238: 2232: 2231: 2229: 2227: 2222: 2213: 2207: 2206: 2204: 2202: 2191: 2185: 2184: 2182: 2180: 2169: 2163: 2162: 2160: 2158: 2153: 2144: 2138: 2137: 2135: 2133: 2128: 2119: 2113: 2112: 2110: 2108: 2102: 2094: 2088: 2087: 2085: 2083: 2077: 2071:. Archived from 2070: 2061: 2055: 2054: 2052: 2050: 2045: 2036: 2030: 2029: 2027: 2025: 2020: 2011: 2005: 2004: 2002: 2000: 1991:. Archived from 1984: 1978: 1977: 1975: 1973: 1968: 1959: 1953: 1952: 1950: 1948: 1943: 1934: 1928: 1927: 1925: 1923: 1918: 1909: 1903: 1902: 1900: 1898: 1893: 1884: 1878: 1877: 1875: 1873: 1868: 1859: 1853: 1852: 1850: 1848: 1843: 1834: 1828: 1827: 1825: 1823: 1808: 1802: 1801: 1799: 1797: 1792: 1783: 1777: 1776: 1774: 1772: 1761: 1755: 1754: 1752: 1750: 1745: 1736: 1730: 1729: 1727: 1725: 1720: 1711: 1705: 1704: 1702: 1700: 1691:. Archived from 1684: 1678: 1677: 1675: 1673: 1667: 1661:. Archived from 1660: 1651: 1645: 1644: 1642: 1640: 1635: 1626: 1620: 1619: 1617: 1615: 1606:. Archived from 1599: 1593: 1592: 1590: 1588: 1583: 1574: 1568: 1567: 1565: 1557: 1551: 1550: 1548: 1546: 1541:on June 12, 2010 1540: 1534:. Archived from 1533: 1524: 1518: 1517: 1515: 1513: 1504:. Archived from 1497: 1491: 1490: 1488: 1486: 1475: 1469: 1468: 1466: 1464: 1459: 1450: 1444: 1443: 1441: 1439: 1428: 1422: 1421: 1419: 1417: 1406: 1400: 1399: 1397: 1395: 1389: 1380: 1374: 1373: 1371: 1369: 1358: 1352: 1351: 1349: 1347: 1342: 1333: 1327: 1326: 1324: 1322: 1311: 1305: 1304: 1302: 1300: 1295: 1286: 1280: 1279: 1277: 1275: 1270: 1264:Florian Mendel. 1261: 1255: 1254: 1252: 1250: 1245: 1236: 1230: 1229: 1227: 1225: 1220: 1211: 1205: 1204: 1202: 1200: 1195: 1179: 1173: 1172: 1170: 1168: 1163: 1154: 1148: 1147: 1145: 1143: 1138: 1129: 1123: 1122: 1120: 1118: 1113:on June 11, 2011 1109:. Archived from 1102: 1096: 1095: 1093: 1091: 1086: 1077: 1071: 1070: 1068: 1066: 1057:. Archived from 1050: 1044: 1043: 1041: 1039: 1034: 1025: 1019: 1018: 1016: 1014: 1009: 1000: 994: 993: 991: 989: 984: 975: 969: 968: 966: 964: 959: 942: 936: 935: 933: 931: 926: 917: 911: 910: 908: 906: 901: 892: 886: 885: 883: 881: 876: 867: 861: 860: 858: 856: 850: 844:. Archived from 843: 834: 828: 827: 825: 823: 812: 806: 800: 794: 788: 782: 776: 770: 757: 751: 745: 739: 734: 728: 727: 725: 723: 712: 706: 705: 697: 691: 690: 688: 686: 675: 666: 665: 663: 661: 650: 644: 643: 641: 639: 628: 601: 600: 598: 596: 585: 576: 575: 573: 571: 556: 550: 549: 547: 545: 538:Federal Register 535: 527: 61:Federal Register 21: 3580: 3579: 3575: 3574: 3573: 3571: 3570: 3569: 3540: 3539: 3538: 3529: 3511: 3440: 3196: 3191: 3150: 3109: 3068:Standardization 3063: 3054:Sponge function 3027: 3003:Birthday attack 2998:Preimage attack 2981: 2937: 2930: 2858: 2841: 2840:General purpose 2835: 2770: 2764: 2613:Other functions 2608: 2575:SHA-3 finalists 2569: 2531: 2508: 2499: 2419: 2414: 2404: 2402: 2392: 2391: 2387: 2377: 2375: 2372: 2367: 2366: 2362: 2352: 2350: 2347: 2342: 2341: 2337: 2327: 2325: 2320: 2319: 2315: 2305: 2303: 2298: 2297: 2293: 2283: 2281: 2278: 2274:Geoffrey Park. 2273: 2272: 2268: 2258: 2256: 2252: 2245: 2240: 2239: 2235: 2225: 2223: 2220: 2215: 2214: 2210: 2200: 2198: 2193: 2192: 2188: 2178: 2176: 2171: 2170: 2166: 2156: 2154: 2151: 2146: 2145: 2141: 2131: 2129: 2126: 2121: 2120: 2116: 2106: 2104: 2100: 2096: 2095: 2091: 2081: 2079: 2075: 2068: 2064:John Washburn. 2063: 2062: 2058: 2048: 2046: 2043: 2038: 2037: 2033: 2023: 2021: 2018: 2013: 2012: 2008: 1998: 1996: 1986: 1985: 1981: 1971: 1969: 1966: 1961: 1960: 1956: 1946: 1944: 1941: 1936: 1935: 1931: 1921: 1919: 1916: 1911: 1910: 1906: 1896: 1894: 1891: 1886: 1885: 1881: 1871: 1869: 1866: 1861: 1860: 1856: 1846: 1844: 1841: 1836: 1835: 1831: 1821: 1819: 1810: 1809: 1805: 1795: 1793: 1790: 1785: 1784: 1780: 1770: 1768: 1763: 1762: 1758: 1748: 1746: 1743: 1738: 1737: 1733: 1723: 1721: 1718: 1713: 1712: 1708: 1698: 1696: 1686: 1685: 1681: 1671: 1669: 1665: 1658: 1653: 1652: 1648: 1638: 1636: 1633: 1628: 1627: 1623: 1613: 1611: 1601: 1600: 1596: 1586: 1584: 1581: 1576: 1575: 1571: 1563: 1559: 1558: 1554: 1544: 1542: 1538: 1531: 1526: 1525: 1521: 1511: 1509: 1499: 1498: 1494: 1484: 1482: 1477: 1476: 1472: 1462: 1460: 1457: 1452: 1451: 1447: 1437: 1435: 1430: 1429: 1425: 1415: 1413: 1408: 1407: 1403: 1393: 1391: 1387: 1382: 1381: 1377: 1367: 1365: 1360: 1359: 1355: 1345: 1343: 1340: 1335: 1334: 1330: 1320: 1318: 1313: 1312: 1308: 1298: 1296: 1293: 1288: 1287: 1283: 1273: 1271: 1268: 1263: 1262: 1258: 1248: 1246: 1243: 1239:Craig Newbold. 1238: 1237: 1233: 1223: 1221: 1218: 1213: 1212: 1208: 1198: 1196: 1193: 1181: 1180: 1176: 1166: 1164: 1161: 1156: 1155: 1151: 1141: 1139: 1136: 1134:"The TIB3 Hash" 1131: 1130: 1126: 1116: 1114: 1104: 1103: 1099: 1089: 1087: 1084: 1079: 1078: 1074: 1064: 1062: 1052: 1051: 1047: 1037: 1035: 1032: 1027: 1026: 1022: 1012: 1010: 1007: 1002: 1001: 997: 987: 985: 982: 977: 976: 972: 962: 960: 957: 944: 943: 939: 929: 927: 924: 919: 918: 914: 904: 902: 899: 894: 893: 889: 879: 877: 874: 869: 868: 864: 854: 852: 848: 841: 836: 835: 831: 821: 819: 814: 813: 809: 801: 797: 789: 785: 777: 773: 767:Wayback Machine 758: 754: 746: 742: 735: 731: 721: 719: 714: 713: 709: 699: 698: 694: 684: 682: 677: 676: 669: 659: 657: 652: 651: 647: 637: 635: 630: 629: 604: 594: 592: 587: 586: 579: 569: 567: 558: 557: 553: 543: 541: 533: 529: 528: 524: 520: 497: 492: 466: 461: 423: 418: 347: 342: 280: 275: 220: 208:sponge function 139: 127: 119: 98: 30: 23: 22: 15: 12: 11: 5: 3578: 3576: 3568: 3567: 3562: 3557: 3552: 3542: 3541: 3535: 3534: 3531: 3530: 3528: 3527: 3516: 3513: 3512: 3510: 3509: 3504: 3502:Random numbers 3499: 3494: 3489: 3484: 3479: 3474: 3469: 3464: 3459: 3454: 3448: 3446: 3442: 3441: 3439: 3438: 3433: 3428: 3426:Garlic routing 3423: 3418: 3413: 3408: 3403: 3398: 3393: 3388: 3383: 3378: 3373: 3368: 3363: 3358: 3353: 3348: 3346:Secure channel 3343: 3337: 3336: 3335: 3324: 3319: 3314: 3309: 3307:Key stretching 3304: 3299: 3294: 3289: 3284: 3279: 3274: 3273: 3272: 3267: 3257: 3255:Cryptovirology 3252: 3247: 3242: 3240:Cryptocurrency 3237: 3232: 3227: 3226: 3225: 3215: 3210: 3204: 3202: 3198: 3197: 3192: 3190: 3189: 3182: 3175: 3167: 3160: 3159: 3156: 3155: 3152: 3151: 3149: 3148: 3143: 3138: 3133: 3128: 3123: 3117: 3115: 3111: 3110: 3108: 3107: 3102: 3097: 3092: 3087: 3082: 3077: 3071: 3069: 3065: 3064: 3062: 3061: 3056: 3051: 3046: 3044:Hash collision 3041: 3035: 3033: 3029: 3028: 3026: 3025: 3020: 3015: 3010: 3005: 3000: 2995: 2989: 2987: 2983: 2982: 2980: 2979: 2974: 2969: 2964: 2959: 2954: 2949: 2943: 2941: 2932: 2931: 2929: 2928: 2923: 2918: 2913: 2908: 2903: 2894: 2889: 2884: 2879: 2874: 2868: 2866: 2860: 2859: 2857: 2856: 2853: 2847: 2845: 2837: 2836: 2834: 2833: 2828: 2823: 2818: 2813: 2808: 2803: 2798: 2793: 2788: 2783: 2777: 2775: 2772:key stretching 2766: 2765: 2763: 2762: 2757: 2752: 2747: 2742: 2737: 2732: 2727: 2722: 2717: 2712: 2707: 2702: 2697: 2692: 2687: 2682: 2677: 2672: 2667: 2662: 2657: 2652: 2647: 2642: 2637: 2632: 2627: 2622: 2616: 2614: 2610: 2609: 2607: 2606: 2600: 2595: 2590: 2585: 2579: 2577: 2571: 2570: 2568: 2567: 2562: 2557: 2552: 2546: 2539: 2537: 2533: 2532: 2530: 2529: 2524: 2519: 2513: 2510: 2509: 2500: 2498: 2497: 2490: 2483: 2475: 2461: 2460: 2455: 2450: 2445: 2440: 2435: 2430: 2425: 2418: 2417:External links 2415: 2413: 2412: 2385: 2360: 2335: 2313: 2291: 2266: 2233: 2208: 2186: 2164: 2139: 2114: 2089: 2056: 2031: 2006: 1979: 1954: 1929: 1904: 1879: 1854: 1829: 1803: 1778: 1756: 1731: 1706: 1679: 1646: 1621: 1610:on May 2, 2009 1594: 1569: 1552: 1519: 1492: 1470: 1445: 1423: 1401: 1385:"Dynamic SHA2" 1375: 1353: 1328: 1306: 1281: 1256: 1231: 1206: 1183:Niels Ferguson 1174: 1149: 1124: 1097: 1072: 1045: 1020: 995: 970: 937: 912: 887: 862: 829: 807: 795: 783: 771: 752: 740: 729: 707: 692: 667: 645: 602: 577: 551: 521: 519: 516: 515: 514: 509: 503: 496: 493: 491: 490: 487: 484: 481: 478: 475: 471: 465: 462: 460: 459: 456: 453: 450: 447: 444: 441: 438: 435: 432: 428: 422: 419: 417: 416: 413: 410: 405: 402: 397: 394: 391: 388: 383: 380: 375: 372: 369: 366: 363: 351: 346: 343: 341: 340: 337: 331: 328: 318: 308: 305: 300: 295: 292: 289: 285: 279: 276: 274: 273: 268: 265: 262: 259: 256: 246: 243:France Telecom 239: 229: 225: 219: 216: 212: 211: 204: 197: 193: 186: 185: 175: 170:(Keccak team, 165: 159: 149: 138: 135: 126: 123: 118: 115: 97: 94: 28: 24: 14: 13: 10: 9: 6: 4: 3: 2: 3577: 3566: 3563: 3561: 3558: 3556: 3553: 3551: 3548: 3547: 3545: 3526: 3518: 3517: 3514: 3508: 3507:Steganography 3505: 3503: 3500: 3498: 3495: 3493: 3490: 3488: 3485: 3483: 3480: 3478: 3475: 3473: 3470: 3468: 3465: 3463: 3462:Stream cipher 3460: 3458: 3455: 3453: 3450: 3449: 3447: 3443: 3437: 3434: 3432: 3429: 3427: 3424: 3422: 3421:Onion routing 3419: 3417: 3414: 3412: 3409: 3407: 3404: 3402: 3401:Shared secret 3399: 3397: 3394: 3392: 3389: 3387: 3384: 3382: 3379: 3377: 3374: 3372: 3369: 3367: 3364: 3362: 3359: 3357: 3354: 3352: 3349: 3347: 3344: 3341: 3338: 3333: 3330: 3329: 3328: 3325: 3323: 3320: 3318: 3315: 3313: 3310: 3308: 3305: 3303: 3300: 3298: 3297:Key generator 3295: 3293: 3290: 3288: 3285: 3283: 3280: 3278: 3275: 3271: 3268: 3266: 3263: 3262: 3261: 3260:Hash function 3258: 3256: 3253: 3251: 3248: 3246: 3243: 3241: 3238: 3236: 3235:Cryptanalysis 3233: 3231: 3228: 3224: 3221: 3220: 3219: 3216: 3214: 3211: 3209: 3206: 3205: 3203: 3199: 3195: 3188: 3183: 3181: 3176: 3174: 3169: 3168: 3165: 3161: 3147: 3144: 3142: 3139: 3137: 3136:Proof of work 3134: 3132: 3129: 3127: 3124: 3122: 3119: 3118: 3116: 3112: 3106: 3103: 3101: 3098: 3096: 3093: 3091: 3088: 3086: 3083: 3081: 3078: 3076: 3073: 3072: 3070: 3066: 3060: 3057: 3055: 3052: 3050: 3047: 3045: 3042: 3040: 3037: 3036: 3034: 3030: 3024: 3021: 3019: 3016: 3014: 3013:Rainbow table 3011: 3009: 3006: 3004: 3001: 2999: 2996: 2994: 2991: 2990: 2988: 2984: 2978: 2975: 2973: 2970: 2968: 2965: 2963: 2960: 2958: 2955: 2953: 2950: 2948: 2945: 2944: 2942: 2939: 2936:Authenticated 2933: 2927: 2924: 2922: 2919: 2917: 2914: 2912: 2909: 2907: 2904: 2902: 2898: 2895: 2893: 2890: 2888: 2885: 2883: 2880: 2878: 2875: 2873: 2870: 2869: 2867: 2865: 2864:MAC functions 2861: 2854: 2852: 2849: 2848: 2846: 2844: 2838: 2832: 2829: 2827: 2824: 2822: 2819: 2817: 2814: 2812: 2809: 2807: 2804: 2802: 2799: 2797: 2794: 2792: 2789: 2787: 2784: 2782: 2779: 2778: 2776: 2773: 2767: 2761: 2758: 2756: 2753: 2751: 2748: 2746: 2743: 2741: 2738: 2736: 2733: 2731: 2728: 2726: 2723: 2721: 2718: 2716: 2713: 2711: 2708: 2706: 2703: 2701: 2698: 2696: 2693: 2691: 2688: 2686: 2683: 2681: 2678: 2676: 2673: 2671: 2668: 2666: 2663: 2661: 2658: 2656: 2653: 2651: 2648: 2646: 2643: 2641: 2638: 2636: 2633: 2631: 2628: 2626: 2623: 2621: 2618: 2617: 2615: 2611: 2604: 2601: 2599: 2596: 2594: 2591: 2589: 2586: 2584: 2581: 2580: 2578: 2576: 2572: 2566: 2563: 2561: 2558: 2556: 2553: 2551:(compromised) 2550: 2547: 2545:(compromised) 2544: 2541: 2540: 2538: 2534: 2528: 2527:Known attacks 2525: 2523: 2520: 2518: 2515: 2514: 2511: 2507: 2503: 2496: 2491: 2489: 2484: 2482: 2477: 2476: 2473: 2469: 2465: 2459: 2456: 2454: 2451: 2449: 2446: 2444: 2441: 2439: 2436: 2434: 2431: 2429: 2426: 2424: 2421: 2420: 2416: 2400: 2396: 2389: 2386: 2371: 2364: 2361: 2346: 2339: 2336: 2324: 2317: 2314: 2302: 2295: 2292: 2277: 2270: 2267: 2251: 2244: 2237: 2234: 2219: 2212: 2209: 2197: 2190: 2187: 2175: 2168: 2165: 2150: 2143: 2140: 2125: 2118: 2115: 2099: 2093: 2090: 2074: 2067: 2060: 2057: 2042: 2035: 2032: 2017: 2010: 2007: 1994: 1990: 1983: 1980: 1965: 1958: 1955: 1940: 1933: 1930: 1915: 1908: 1905: 1890: 1883: 1880: 1865: 1858: 1855: 1840: 1833: 1830: 1818: 1814: 1807: 1804: 1789: 1782: 1779: 1767: 1760: 1757: 1742: 1735: 1732: 1717: 1710: 1707: 1694: 1690: 1683: 1680: 1664: 1657: 1650: 1647: 1632: 1625: 1622: 1609: 1605: 1598: 1595: 1580: 1573: 1570: 1562: 1556: 1553: 1537: 1530: 1523: 1520: 1507: 1503: 1496: 1493: 1481: 1474: 1471: 1456: 1449: 1446: 1434: 1427: 1424: 1412: 1405: 1402: 1386: 1379: 1376: 1364: 1357: 1354: 1339: 1338:"Dynamic SHA" 1332: 1329: 1317: 1310: 1307: 1292: 1285: 1282: 1267: 1260: 1257: 1242: 1235: 1232: 1217: 1210: 1207: 1192: 1188: 1184: 1178: 1175: 1160: 1153: 1150: 1135: 1128: 1125: 1112: 1108: 1101: 1098: 1083: 1076: 1073: 1060: 1056: 1049: 1046: 1031: 1024: 1021: 1006: 999: 996: 981: 974: 971: 956: 952: 948: 947:Anne Canteaut 941: 938: 923: 916: 913: 898: 891: 888: 873: 866: 863: 847: 840: 833: 830: 818: 811: 808: 804: 799: 796: 792: 787: 784: 780: 775: 772: 768: 764: 761: 756: 753: 749: 744: 741: 738: 733: 730: 722:September 15, 717: 711: 708: 703: 696: 693: 680: 674: 672: 668: 656: 649: 646: 633: 627: 625: 623: 621: 619: 617: 615: 613: 611: 609: 607: 603: 590: 584: 582: 578: 565: 561: 555: 552: 539: 532: 526: 523: 517: 513: 510: 507: 504: 502: 499: 498: 494: 488: 485: 482: 479: 476: 473: 472: 470: 463: 457: 454: 451: 448: 445: 442: 439: 436: 433: 430: 429: 427: 420: 414: 411: 409: 408:Spectral Hash 406: 403: 401: 398: 395: 392: 389: 387: 384: 381: 379: 376: 373: 370: 367: 364: 361: 357: 353: 352: 350: 344: 338: 335: 332: 329: 326: 322: 319: 316: 312: 309: 306: 304: 301: 299: 296: 293: 290: 287: 286: 284: 277: 272: 269: 266: 263: 260: 257: 254: 250: 247: 244: 240: 237: 233: 230: 227: 226: 224: 217: 215: 209: 205: 202: 201:cryptanalysis 198: 194: 191: 190: 189: 183: 179: 176: 173: 169: 166: 163: 160: 157: 153: 150: 147: 144: 143: 142: 136: 134: 132: 124: 122: 116: 114: 112: 108: 105:2010) at the 104: 95: 93: 91: 86: 84: 83: 77: 75: 71: 67: 63: 62: 57: 53: 49: 45: 44:hash function 41: 37: 32: 27: 19: 3457:Block cipher 3302:Key schedule 3292:Key exchange 3282:Kleptography 3245:Cryptosystem 3194:Cryptography 3089: 2574: 2403:. Retrieved 2399:the original 2388: 2378:November 30, 2376:. Retrieved 2363: 2351:. Retrieved 2338: 2328:November 14, 2326:. Retrieved 2316: 2306:November 14, 2304:. Retrieved 2294: 2282:. Retrieved 2269: 2257:. Retrieved 2250:the original 2236: 2226:December 15, 2224:. Retrieved 2211: 2201:December 15, 2199:. Retrieved 2189: 2179:December 23, 2177:. Retrieved 2167: 2157:December 23, 2155:. Retrieved 2142: 2130:. Retrieved 2117: 2107:December 23, 2105:. Retrieved 2092: 2080:. Retrieved 2073:the original 2059: 2049:December 11, 2047:. Retrieved 2034: 2024:December 15, 2022:. Retrieved 2009: 1999:November 10, 1997:. Retrieved 1993:the original 1982: 1972:November 30, 1970:. Retrieved 1957: 1947:December 11, 1945:. Retrieved 1932: 1922:November 23, 1920:. Retrieved 1907: 1897:December 23, 1895:. Retrieved 1882: 1870:. Retrieved 1857: 1847:December 11, 1845:. Retrieved 1832: 1820:. Retrieved 1816: 1806: 1794:. Retrieved 1781: 1771:November 11, 1769:. Retrieved 1759: 1747:. Retrieved 1734: 1724:December 11, 1722:. Retrieved 1709: 1697:. Retrieved 1693:the original 1689:"Aww, p*sh!" 1682: 1670:. Retrieved 1663:the original 1649: 1639:November 14, 1637:. Retrieved 1624: 1612:. Retrieved 1608:the original 1597: 1587:December 11, 1585:. Retrieved 1572: 1555: 1543:. Retrieved 1536:the original 1522: 1510:. Retrieved 1506:the original 1495: 1485:November 10, 1483:. Retrieved 1473: 1461:. Retrieved 1448: 1438:November 10, 1436:. Retrieved 1426: 1416:December 21, 1414:. Retrieved 1404: 1394:December 11, 1392:. Retrieved 1378: 1368:December 21, 1366:. Retrieved 1356: 1346:December 11, 1344:. Retrieved 1331: 1321:December 21, 1319:. Retrieved 1309: 1299:December 11, 1297:. Retrieved 1284: 1274:December 23, 1272:. Retrieved 1259: 1249:December 23, 1247:. Retrieved 1234: 1224:December 11, 1222:. Retrieved 1209: 1197:. Retrieved 1187:Stefan Lucks 1177: 1167:December 11, 1165:. Retrieved 1152: 1142:November 29, 1140:. Retrieved 1127: 1115:. Retrieved 1111:the original 1100: 1090:December 11, 1088:. Retrieved 1075: 1065:November 14, 1063:. Retrieved 1059:the original 1048: 1038:November 11, 1036:. Retrieved 1023: 1013:December 11, 1011:. Retrieved 998: 988:December 11, 986:. Retrieved 973: 963:December 11, 961:. Retrieved 951:Aline Gouget 940: 930:December 11, 928:. Retrieved 915: 905:December 11, 903:. Retrieved 890: 880:December 11, 878:. Retrieved 865: 853:. Retrieved 846:the original 832: 822:November 10, 820:. Retrieved 810: 798: 786: 774: 755: 743: 732: 720:. Retrieved 710: 695: 683:. Retrieved 660:December 23, 658:. Retrieved 648: 638:December 10, 636:. Retrieved 593:. Retrieved 568:. Retrieved 563: 554: 542:. Retrieved 537: 525: 469:are public. 467: 424: 374:Dynamic SHA2 348: 281: 221: 213: 187: 164:(Hongjun Wu) 140: 128: 120: 99: 87: 80: 78: 59: 35: 33: 31: 26: 3445:Mathematics 3436:Mix network 3126:Merkle tree 3114:Utilization 3100:NSA Suite B 2353:November 9, 2284:November 9, 2259:January 12, 2132:November 9, 2082:November 9, 1962:Björn Fay. 1872:November 8, 1699:November 6, 1672:November 9, 1614:November 8, 1545:November 8, 1512:November 7, 1117:October 12, 570:November 6, 544:November 6, 371:Dynamic SHA 196:algorithm." 3544:Categories 3396:Ciphertext 3366:Decryption 3361:Encryption 3322:Ransomware 2938:encryption 2715:RadioGatún 2522:Comparison 1964:"MeshHash" 1817:CSRC: NIST 1383:Zijie Xu. 1336:Zijie Xu. 595:October 2, 518:References 449:StreamHash 440:Khichidi-1 3386:Plaintext 2855:KDF1/KDF2 2774:functions 2760:Whirlpool 2438:SHA-3 Zoo 1822:April 26, 1005:"ARIRANG" 632:"Round 1" 458:Waterfall 321:SANDstorm 267:SHAvite-3 236:Bernstein 137:Finalists 3525:Category 3431:Kademlia 3391:Codetext 3334:(CSPRNG) 3080:CRYPTREC 2911:Poly1305 2831:yescrypt 2745:Streebog 2625:CubeHash 2605:(winner) 2405:March 1, 1463:July 10, 1433:"edon-r" 1199:July 10, 1189:(2009). 1055:"CRUNCH" 763:Archived 685:July 24, 495:See also 489:ZK-Crypt 443:MeshHash 396:MCSSHA-3 354:AURORA ( 307:Lesamnta 232:CubeHash 182:Schneier 117:Entrants 68:for the 3201:General 2986:Attacks 2916:SipHash 2872:CBC-MAC 2806:LM hash 2786:Balloon 2650:HAS-160 2345:"Ponic" 1796:May 19, 1749:May 19, 855:May 19, 474:HASH 2X 446:SHAMATA 412:Twister 390:ESSENCE 368:Cheetah 365:Blender 317:et al.) 184:et al.) 174:et al.) 158:et al.) 156:Knudsen 96:Process 46:called 3312:Keygen 3146:Pepper 3085:NESSIE 3032:Design 2826:scrypt 2821:PBKDF2 2796:Catena 2791:bcrypt 2781:Argon2 2740:Snefru 2735:Shabal 2730:SWIFFT 2710:RIPEMD 2705:N-hash 2680:MASH-2 2675:MASH-1 2660:Kupyna 2620:BLAKE3 2603:Keccak 2588:Grøstl 2565:BLAKE2 1390:. NIST 805:(PDF). 781:(PDF). 483:NKS 2D 477:Maraca 452:Tangle 431:Abacus 415:Vortex 386:EnRUPT 382:Edon-R 334:SWIFFT 330:Sarmal 315:Rivest 294:CRUNCH 264:Shabal 241:ECHO ( 172:Daemen 168:Keccak 152:Grøstl 131:Keccak 125:Winner 111:Keccak 103:CRYPTO 74:Keccak 3342:(PRN) 2940:modes 2816:Makwa 2811:Lyra2 2801:crypt 2750:Tiger 2700:MDC-2 2655:HAVAL 2640:Fugue 2598:Skein 2583:BLAKE 2560:SHA-3 2555:SHA-2 2549:SHA-1 2373:(PDF) 2348:(PDF) 2279:(PDF) 2253:(PDF) 2246:(PDF) 2221:(PDF) 2152:(PDF) 2127:(PDF) 2076:(PDF) 2069:(PDF) 2044:(PDF) 2019:(PDF) 1967:(PDF) 1942:(PDF) 1917:(PDF) 1892:(PDF) 1867:(PDF) 1842:(PDF) 1791:(PDF) 1744:(PDF) 1719:(PDF) 1666:(PDF) 1659:(PDF) 1634:(PDF) 1582:(PDF) 1564:(PDF) 1539:(PDF) 1532:(PDF) 1458:(PDF) 1388:(PDF) 1341:(PDF) 1294:(PDF) 1269:(PDF) 1244:(PDF) 1219:(PDF) 1194:(PDF) 1162:(PDF) 1137:(PDF) 1085:(PDF) 1033:(PDF) 1008:(PDF) 983:(PDF) 958:(PDF) 925:(PDF) 900:(PDF) 875:(PDF) 849:(PDF) 842:(PDF) 534:(PDF) 486:Ponic 480:MIXIT 434:Boole 404:Sgàil 400:NaSHA 261:Luffa 258:Hamsi 249:Fugue 178:Skein 146:BLAKE 56:SHA-2 52:SHA-1 48:SHA-3 3141:Salt 3105:CNSA 2972:IAPM 2926:VMAC 2921:UMAC 2906:PMAC 2901:CMAC 2897:OMAC 2892:NMAC 2887:HMAC 2882:GMAC 2851:HKDF 2720:SIMD 2670:Lane 2645:GOST 2630:ECOH 2517:List 2504:and 2407:2009 2380:2008 2355:2008 2330:2008 2308:2008 2286:2008 2261:2014 2228:2008 2203:2008 2181:2008 2159:2008 2134:2008 2109:2008 2084:2008 2051:2008 2026:2008 2001:2008 1974:2008 1949:2008 1924:2008 1899:2008 1874:2008 1849:2008 1824:2019 1798:2009 1773:2008 1751:2009 1726:2008 1701:2008 1674:2008 1641:2008 1616:2008 1589:2008 1547:2008 1514:2008 1487:2008 1465:2009 1440:2008 1418:2008 1396:2008 1370:2008 1348:2008 1323:2008 1301:2008 1276:2008 1251:2008 1226:2008 1201:2009 1169:2008 1144:2008 1119:2010 1092:2008 1067:2008 1040:2008 1015:2008 990:2008 965:2008 932:2008 907:2008 882:2008 857:2009 824:2008 724:2009 687:2009 662:2008 640:2008 597:2012 572:2008 546:2008 455:WaMM 378:ECOH 358:and 356:Sony 339:TIB3 303:Lane 271:SIMD 54:and 34:The 2977:OCB 2967:GCM 2962:EAX 2957:CWC 2947:CCM 2877:DAA 2755:VSH 2725:SM3 2695:MD6 2690:MD4 2685:MD2 2665:LSH 2635:FSB 2543:MD5 437:DCH 393:LUX 311:MD6 298:FSB 291:CHI 253:IBM 3546:: 2593:JH 1815:. 1185:; 670:^ 605:^ 580:^ 562:. 536:. 162:JH 92:. 85:. 3186:e 3179:t 3172:v 2899:/ 2494:e 2487:t 2480:v 2409:. 2382:. 2357:. 2332:. 2310:. 2288:. 2263:. 2230:. 2205:. 2183:. 2161:. 2136:. 2111:. 2086:. 2053:. 2028:. 2003:. 1976:. 1951:. 1926:. 1901:. 1876:. 1851:. 1826:. 1800:. 1775:. 1753:. 1728:. 1703:. 1676:. 1643:. 1618:. 1591:. 1566:. 1549:. 1516:. 1489:. 1467:. 1442:. 1420:. 1398:. 1372:. 1350:. 1325:. 1303:. 1278:. 1253:. 1228:. 1203:. 1171:. 1146:. 1121:. 1094:. 1069:. 1042:. 1017:. 992:. 967:. 934:. 909:. 884:. 859:. 826:. 726:. 704:. 689:. 664:. 642:. 599:. 574:. 548:. 362:) 336:X 327:) 323:( 313:( 255:) 251:( 245:) 238:) 234:( 180:( 154:( 20:)

Index

NIST SHA-3 competition
National Institute of Standards and Technology
hash function
SHA-3
SHA-1
SHA-2
Federal Register
development process
Advanced Encryption Standard
Keccak
Secure Hash Standard
Password Hashing Competition
CRYPTO
University of California, Santa Barbara
Keccak
Keccak
BLAKE
Grøstl
Knudsen
JH
Keccak
Daemen
Skein
Schneier
cryptanalysis
sponge function
CubeHash
Bernstein
France Telecom
Fugue

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.