Vincent Rijmen
KU Leuven
The SHA-3 process
We give a brief overview of the start of the SHA-3 selection process. Subsequently we discuss in some detail the design approaches taken by the 5 hash functions that were competing in the final round of the evaluation. Besides the technical elements, we also mention some organisational issues that impact the competition and possibly its outcome.
[Slides]