会议专题

Explanation of Sha-3 Algorithm By the Third Round Activities

On Dec. 10, 2010, the NIST declares the fore five algorithms for SHA-3 competition : Keccak, Skein, JH, Grostl, BLAKE. In this paper, we introduce the five candidates. The news extension. of BLAKE uses the Mode of LAKE. Grostl follows the design principles of AES.JH uses the cycle structure of SPN. Keccak adopts the sealing sponge structure. SKEIN is a one-way function which is extended from the design of Threefish group password. After introducing and comparing the five candidates, we made a list of their respective characteristics.

SHA-3 Candidate algorithms comparison

Fang Pang Lili Liu

School of Computer Science and Technology China University of Mining and Technology, CUMT Xuzhou, China

国际会议

2012 International Conference on Computer Science and Electronic Engineering(2012 IEEE计算机科学与电子工程国际会议 ICCSEE 2012)

杭州

英文

711-714

2012-03-23(万方平台首次上网日期,不代表论文的发表时间)