Inside SHA-3

作者: William Stallings

DOI: 10.1109/MPOT.2013.2254508

关键词: Secure Hash AlgorithmComputer scienceHash chainSecure Hash StandardComputer securityCryptographic hash functionSHA-2NIST hash function competitionHash functionCollision attack

摘要: The National Institute of Standards and Technology (NIST) has selected a new cryptographic hash algorithm through public competition. is referred to as the Secure Hash Algorithm 3 (SHA-3) intended complement SHA-2 algorithms currently specified in Federal Information Processing Standard (FIPS) 180-3, Standard. be suitable for use by U.S. government well private sector available royalty-free worldwide.

参考文章(6)
Bart Preneel, The first 30 years of cryptographic hash functions and the NIST SHA-3 competition the cryptographers track at the rsa conference. pp. 1- 14 ,(2010) , 10.1007/978-3-642-11925-5_1
Tam Harbert, New king of security algorithms crowned IEEE Spectrum. ,vol. 49, pp. 12- 13 ,(2012) , 10.1109/MSPEC.2012.6361745
William E. Burr, A New Hash Competition ieee symposium on security and privacy. ,vol. 6, pp. 60- 62 ,(2008) , 10.1109/MSP.2008.55
Xiaoyun Wang, Hongbo Yu, How to break MD5 and other hash functions theory and application of cryptographic techniques. pp. 19- 35 ,(2005) , 10.1007/11426639_2
Xiaoyun Wang, Hongbo Yu, Yiqun Lisa Yin, Efficient collision search attacks on SHA-0 international cryptology conference. pp. 1- 16 ,(2005) , 10.1007/11535218_1
Michaël P, Guido B, Joan D, Cryptographic sponge functions ,(2011)