SHA-3 Design and Cryptanalysis Report
Rechberger, Christian, Bjorstad, Tor, Daemen, Joan, De Canniere, Christophe, & Gauravaram, Praveen (2010) SHA-3 Design and Cryptanalysis Report. ECRYPT II European Network of Excellence in Cryptology II, ICT-2007-216676. Katholieke Universiteit Leuven.
The competition to select a new secure hash function standard SHA-3 was initiated in response to surprising progress in the cryptanalysis of existing hash function constructions that started in 2004. In this report we survey design and cryptanalytic results of those 14 candidates that remain in the competition, about 1.5 years after the competition started with the initial submission of the candidates in October 2008. Implementation considerations are not in the scope of this report. The diversity of designs is also reflected in the great variety of cryptanalytic techniques and results that were applied and found during this time. This report gives an account of those techniques and results.
Impact and interest:
Citation counts are sourced monthly from and citation databases.
These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.
Citations counts from theindexing service can be viewed at the linked Google Scholar™ search.
|Divisions:||Current > Schools > School of Electrical Engineering & Computer Science
Current > QUT Faculties and Divisions > Science & Engineering Faculty
|Copyright Owner:||Copyright 2010 European Commission|
|Deposited On:||09 Feb 2015 06:23|
|Last Modified:||09 Feb 2015 06:23|
Repository Staff Only: item control page