Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).
NIST Authors in Bold
|Author(s):||Quynh H. Dang;|
|Title:||Secure Hash Standard (SHS)|
|Published:||March 06, 2012|
|Abstract:||[Superseded by FIPS 180-4 (August 2015): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=919060] This standard specifies hash algorithms that can be used to generate digests of messages. The digests are used to detect whether messages have been changed since the digests were generated. [Supersedes FIPS 180-3 (October 2008): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901372]|
|Citation:||Federal Inf. Process. Stds. (NIST FIPS) - 180-4|
|Keywords:||computer security, cryptography, message digest, hash function, hash algorithm, Federal Information Processing Standards, Secure Hash Standard|
|Research Areas:||Computer Security, Federal Information Processing Standards|
|PDF version:||Click here to retrieve PDF version of paper (1MB)|