Explanation of Sha-3 Algorithm By the Third Round Activities
On Dec. 10, 2010, the NIST declares the fore five algorithms for SHA-3 competition : Keccak, Skein, JH, Grostl, BLAKE. In this paper, we introduce the five candidates. The news extension. of BLAKE uses the Mode of LAKE. Grostl follows the design principles of AES.JH uses the cycle structure of SPN. Keccak adopts the sealing sponge structure. SKEIN is a one-way function which is extended from the design of Threefish group password. After introducing and comparing the five candidates, we made a list of their respective characteristics.
SHA-3 Candidate algorithms comparison
Fang Pang Lili Liu
School of Computer Science and Technology China University of Mining and Technology, CUMT Xuzhou, China
国际会议
杭州
英文
711-714
2012-03-23(万方平台首次上网日期,不代表论文的发表时间)