|
Alan Kaminsky
|
|
•
|
|
Department of Computer Science
|
|
•
|
|
Rochester Institute of Technology
|
|
•
|
|
4486 +
2220 =
6706
|
|
Home Page
|
Message Digests for the Twenty-First Century
An Overview of the NIST SHA-3 Cryptographic Hash Algorithm Competition
Alan Kaminsky
Department of Computer Science
B. Thomas Golisano College of Computing and Information Sciences
Rochester Institute of Technology
September 27, 2009
Embedded Systems and Communications Security Workshop
28th IEEE International Symposium on Reliable Distributed Systems (SRDS 2009)
Niagara Falls, NY, USA
Presentation
The HashClash Project
MD5 Collisions
The SHA-3 Competition
The SHA-3 Round 2 Candidate Specifications
These are the specifications
of the SHA-3 Round 2 candidate hash functions
as of 26-Sep-2009.
For the latest information,
refer to the NIST and SHA-3 Zoo web sites above.
|
Alan Kaminsky
|
|
•
|
|
Department of Computer Science
|
|
•
|
|
Rochester Institute of Technology
|
|
•
|
|
4486 +
2220 =
6706
|
|
Home Page
|
Copyright © 2009 Alan Kaminsky.
All rights reserved.
Last updated 26-Sep-2009.
Please send comments to ark@cs.rit.edu.