Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

This is an archive
(replace .gov by .rip)

NISTIR 7764

Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competition

Date Published: February 2011

Author(s)

Meltem Sönmez Turan (NIST), Ray Perlner (NIST), Lawrence Bassham (NIST), William Burr (NIST), Donghoon Chang (NIST), Shu-jen Chang (NIST), Morris Dworkin (NIST), John Kelsey (NIST), Souradyuti Paul (NIST), Rene Peralta (NIST)

Abstract

Keywords

cryptographic hash algorithm; cryptographic hash function; cryptographic hash competition; cryptography; SHA-3 competition
Control Families

Configuration Management;

Documentation

Publication:
NISTIR 7764 (DOI)
Local Download

Supplemental Material:
None available

Related NIST Publications:
FIPS 202
NISTIR 7896
NISTIR 7620

Topics

Security and Privacy
digital signatures