SHA-3: second round in the cryptographers’ Olympiad

Source: Heise

The competition run by the US National Institute of Standards and Technology (NIST) to find the next generation of cryptographic hash functions has gone into its second round. Fourteen algorithms are still vying to be crowned in 2012 as the next standard for cryptographic hash functions, SHA-3 (Secure Hash Algorithm).

I am curious who will win.


© Copyright 2009 Sorin Mustaca, All rights Reserved. Written For: Sorin Mustaca on Cybersecurity


Check www.endpoint-cybersecurity.com for seeing the consulting services we offer.

Visit www.itsecuritynews.info for latest security news in English
Besuchen Sie de.itsecuritynews.info für IT Sicherheits News auf Deutsch