We attempted to make design choices according to requirements derived from the identified needs of future SHA3 users, as in a typical engineering project. This chapter is structured as follows: Section 7.1 first summarizes the requirements defined by NIST in its call for proposals, from minimal acceptance criteria to strict security requirements.
CITATION STYLE
Aumasson, J. P., Meier, W., Phan, R. C. W., & Henzen, L. (2014). Design Rationale. In Information Security and Cryptography (Vol. 24, pp. 107–129). Springer International Publishing. https://doi.org/10.1007/978-3-662-44757-4_7
Mendeley helps you to discover research relevant for your work.