Monthly Archives: March 2016

SHA-3 Cryptographic hash

Introduction Keccak is a permutation function designed by Guido Bertoni, Joan Daemen, MichaĆ«l Peeters, and Gilles Van Assche. It was selected by NIST to become the SHA-3 standard and is a complement to SHA-2 rather than a replacement. Currently, SHA-2 … Continue reading

Posted in assembly, cryptography, programming, security | Tagged , , , , , , , , , | 2 Comments