Cryptology ePrint Archive: Report 2015/389
Guido Bertoni and Joan Daemen and Michael Peeters and Gilles Van Assche
Abstract: In October 2012, the American National Institute of Standards and Technology (NIST) announced the selection of Keccak as the winner of the SHA-3 Cryptographic Hash Algorithm Competition [10,11]. This concluded an open competition that was remarkable both for its magnitude and the involvement of the cryptographic community. Public review is of paramount importance to increase the confidence in the new standard and to favor its quick adoption. The SHA-3 competition explicitly took this into account by giving open access to the candidate algorithms and everyone in the cryptographic community could try to break them, compare their performance, or simply give comments.
Category / Keywords: cryptographic hash function, Keccak, sponge function, duplex construction, authenticated encryption
Original Publication (in the same form): IACR-EUROCRYPT-2013
Date: received 26 Apr 2015
Contact author: keccak at noekeon org
Available format(s): PDF | BibTeX Citation
Note: This is the extended abstract of the invited talk presented at Eurocrypt 2013.
Version: 20150429:130521 (All versions of this report)
Short URL: ia.cr/2015/389
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]