登入
選單
返回
Google圖書搜尋
SHA-3 Derived Functions: CSHAKE, KMAC, TupleHash and ParallelHash
John Kelsey
出版
U.S. Department of Commerce, National Institute of Standards and Technology
, 2016
URL
http://books.google.com.hk/books?id=BOSLAQAACAAJ&hl=&source=gbs_api
註釋
This Recommendation specifies four types of SHA-3-derived functions: cSHAKE, KMAC, TupleHash, and ParallelHash, each defined for a 128- and 256-bit security strength. cSHAKE is a customizable variant of the SHAKE function, as defined in Federal Information Processing Standard (FIPS) 202. KMAC (for KECCAK Message Authentication Code) is a variable-length message authentication code algorithm based on KECCAK; it can also be used as a pseudorandom function. TupleHash is a variable-length hash function designed to hash tuples of input strings without trivial collisions. ParallelHash is a variable-length hash function that can hash very long messages in parallel.