Cryptology ePrint Archive: Report 2008/511
Classification of the SHA-3 Candidates
Ewan Fleischmann and Christian Forler and Michael Gorski
Abstract: In this note we give an overview on the current state of the SHA-3
candidates. First, we classify all publicly known candidates and,
second, we outline and summarize the performance data as given in the
candidates documentation for 64-bit and 32-bit implementations. We
define performance classes and classify the hash algorithms. Note,
that this article will be updated as soon as new candidates arrive or
new cryptanalytic results get published. Comments to the authors of
this article are welcome.
Category / Keywords: secret-key cryptography / hash function, SHA-3, classification
Date: received 3 Dec 2008, last revised 19 Apr 2009
Contact author: {Ewan Fleischmann, Michael Gorski} (at) uni-weimar de
Available format(s): PDF | BibTeX Citation
Version: 20090419:140227 (All versions of this report)
Short URL: ia.cr/2008/511
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]