Additional Secure Hash Algorithm Standards Offer New Opportunities for Data Protection
Morris J. Dworkin, Larry Feldman, Gregory A. Witte
This bulletin summarizes the information presented in FIPS 202. The publication specifies the Secure Hash Algorithm-3 (SHA-3) family of functions on binary data. Each of the SHA-3 functions is based on an instance of the KECCAK algorithm that NIST selected as the winner of the SHA-3 Cryptographic Hash Algorithm Competition.
, Feldman, L.
and Witte, G.
Additional Secure Hash Algorithm Standards Offer New Opportunities for Data Protection, ITL Bulletin, National Institute of Standards and Technology, Gaithersburg, MD, [online], https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=919417
(Accessed December 10, 2023)