SHA-3 Design and Cryptanalysis Report

Rechberger, Christian, Bjorstad, Tor, Daemen, Joan, De Canniere, Christophe, & Gauravaram, Praveen (2010) SHA-3 Design and Cryptanalysis Report. ECRYPT II European Network of Excellence in Cryptology II, ICT-2007-216676. Katholieke Universiteit Leuven.

View at publisher


The competition to select a new secure hash function standard SHA-3 was initiated in response to surprising progress in the cryptanalysis of existing hash function constructions that started in 2004. In this report we survey design and cryptanalytic results of those 14 candidates that remain in the competition, about 1.5 years after the competition started with the initial submission of the candidates in October 2008. Implementation considerations are not in the scope of this report. The diversity of designs is also reflected in the great variety of cryptanalytic techniques and results that were applied and found during this time. This report gives an account of those techniques and results.

Impact and interest:

Search Google Scholar™

Citation counts are sourced monthly from Scopus and Web of Science® citation databases.

These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.

Citations counts from the Google Scholar™ indexing service can be viewed at the linked Google Scholar™ search.

ID Code: 81710
Item Type: Report
Refereed: No
Divisions: Current > Schools > School of Electrical Engineering & Computer Science
Current > QUT Faculties and Divisions > Science & Engineering Faculty
Copyright Owner: Copyright 2010 European Commission
Deposited On: 09 Feb 2015 06:23
Last Modified: 09 Feb 2015 06:23

Export: EndNote | Dublin Core | BibTeX

Repository Staff Only: item control page