27 March 2013 Brussels, Belgium

Vincent Rijmen
KU Leuven

The SHA-3 process

We give a brief overview of the start of the SHA-3 selection process. Subsequently we discuss in some detail the design approaches taken by the 5 hash functions that were competing in the final round of the evaluation. Besides the technical elements, we also mention some organisational issues that impact the competition and possibly its outcome.


[Slides]