Paper 2015/389

Keccak

Guido Bertoni, Joan Daemen, Michael Peeters, and Gilles Van Assche

Abstract

In October 2012, the American National Institute of Standards and Technology (NIST) announced the selection of Keccak as the winner of the SHA-3 Cryptographic Hash Algorithm Competition [10,11]. This concluded an open competition that was remarkable both for its magnitude and the involvement of the cryptographic community. Public review is of paramount importance to increase the confidence in the new standard and to favor its quick adoption. The SHA-3 competition explicitly took this into account by giving open access to the candidate algorithms and everyone in the cryptographic community could try to break them, compare their performance, or simply give comments.

Note: This is the extended abstract of the invited talk presented at Eurocrypt 2013.

Metadata
Available format(s)
PDF
Publication info
Published by the IACR in EUROCRYPT 2013
DOI
10.1007/978-3-642-38348-9_19
Keywords
cryptographic hash functionKeccaksponge functionduplex constructionauthenticated encryption
Contact author(s)
keccak @ noekeon org
History
2015-04-29: received
Short URL
https://ia.cr/2015/389
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2015/389,
      author = {Guido Bertoni and Joan Daemen and Michael Peeters and Gilles Van Assche},
      title = {Keccak},
      howpublished = {Cryptology {ePrint} Archive, Paper 2015/389},
      year = {2015},
      doi = {10.1007/978-3-642-38348-9_19},
      url = {https://eprint.iacr.org/2015/389}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.