Keccak

195Citations
Citations of this article
78Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In October 2012, the American National Institute of Standards and Technology (NIST) announced the selection of Keccak as the winner of the SHA-3 Cryptographic Hash Algorithm Competition [10,11]. This concluded an open competition that was remarkable both for its magnitude and the involvement of the cryptographic community. Public review is of paramount importance to increase the confidence in the new standard and to favor its quick adoption. The SHA-3 competition explicitly took this into account by giving open access to the candidate algorithms and everyone in the cryptographic community could try to break them, compare their performance, or simply give comments. © 2013 International Association for Cryptologic Research.

Cite

CITATION STYLE

APA

Bertoni, G., Daemen, J., Peeters, M., & Van Assche, G. (2013). Keccak. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7881 LNCS, pp. 313–314). https://doi.org/10.1007/978-3-642-38348-9_19

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free