The following NIST-authored publications are directly related to this project.
Series & Number | Title | Status | Released |
---|---|---|---|
SP 800-185 | SHA-3 Derived Functions: cSHAKE, KMAC, TupleHash, and ParallelHash | Final | 12/22/2016 |
SP 800-131A Rev. 1 | Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths | Withdrawn | 11/06/2015 |
FIPS 202 | SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions | Final | 08/04/2015 |
FIPS 180-4 | Secure Hash Standard (SHS) | Final | 08/04/2015 |
SP 800-107 Rev. 1 | Recommendation for Applications Using Approved Hash Algorithms | Final | 08/24/2012 |
FIPS 198-1 | The Keyed-Hash Message Authentication Code (HMAC) | Final | 07/16/2008 |
FIPS 102 | Guideline for Computer Security Certification and Accreditation | Withdrawn | 09/27/1983 |
Security and Privacy: message authentication