First Page | Document Content | |
---|---|---|
Date: 2015-08-04 11:34:10Cryptography Cryptographic hash functions Hashing NIST hash function competition SHA-3 Secure Hash Algorithm SHA-2 SHA-1 Hash-based message authentication code Secure Hash Standard Sponge function Hash function | SHA-3 Standard: Permutation-Based Hash and Extendable-Output FunctionsAdd to Reading ListSource URL: nvlpubs.nist.govDownload Document from Source WebsiteFile Size: 1,39 MBShare Document on Facebook |