References
- Damgård , I. 1989 . A Design Principle for Hash Functions. In G. Brassard, ed., Proceedings of Advances in Cryptology (CRYPTO '89), Volume 435 of Lecture Notes in Computer Science, pp. 416–427. Springer-Verlag: London, UK.
- Federal Information Processing Standard (FIPS) 180-4. March 2012. Secure Hash Standard. National Institute of Standards and Technology.
- Federal Information Processing Standard (FIPS) 186-3. June 2009. Digital Signature Standard (DSS). National Institute of Standards and Technology .
- Federal Information Processing Standard (FIPS) 198-1. July 2008. The Keyed-Hash Message Authentication Code (HMAC). National Institute of Standards and Technology .
- Gueron , S. , S. Johnson , and J. Walker . 2011. SHA-512/256, 2011 Eighth International Conference on Information Technology: New Generation, 11–13 April, Las Vegas, NV, USA.
- NIST. Third (Final Round) Candidates. http://csrc.nist.gov/groups/ST/hash/sha-3/index.html (accessed 21 November 2012) .
- NIST SP 800-56A. March 2007. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography .
- NIST SP 800-90A. January 2012. Recommendation for Random Number Generation Using Deterministic Random Bit Generators .
- NIST SP 800-107. Revision 1. August 2012. Recommendation for Applications Using Approved Hash Algorithms .
- Performance of sha256 for Long Messages. http://bench.cr.yp.to/results-hash.html (accessed 21 November 2012).
- This article not subject to United States copyright law.