250
Views
23
CrossRef citations to date
0
Altmetric
Original Articles

Changes in Federal Information Processing Standard (FIPS) 180-4, Secure Hash Standard

Pages 69-73 | Published online: 11 Jan 2013

References

  • Damgård , I. 1989 . A Design Principle for Hash Functions. In G. Brassard, ed., Proceedings of Advances in Cryptology (CRYPTO '89), Volume 435 of Lecture Notes in Computer Science, pp. 416–427. Springer-Verlag: London, UK.
  • Federal Information Processing Standard (FIPS) 180-4. March 2012. Secure Hash Standard. National Institute of Standards and Technology.
  • Federal Information Processing Standard (FIPS) 186-3. June 2009. Digital Signature Standard (DSS). National Institute of Standards and Technology .
  • Federal Information Processing Standard (FIPS) 198-1. July 2008. The Keyed-Hash Message Authentication Code (HMAC). National Institute of Standards and Technology .
  • Gueron , S. , S. Johnson , and J. Walker . 2011. SHA-512/256, 2011 Eighth International Conference on Information Technology: New Generation, 11–13 April, Las Vegas, NV, USA.
  • NIST. Third (Final Round) Candidates. http://csrc.nist.gov/groups/ST/hash/sha-3/index.html (accessed 21 November 2012) .
  • NIST SP 800-56A. March 2007. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography .
  • NIST SP 800-90A. January 2012. Recommendation for Random Number Generation Using Deterministic Random Bit Generators .
  • NIST SP 800-107. Revision 1. August 2012. Recommendation for Applications Using Approved Hash Algorithms .
  • Performance of sha256 for Long Messages. http://bench.cr.yp.to/results-hash.html (accessed 21 November 2012).
  • This article not subject to United States copyright law.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.