SHA-3 (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "SHA-3" in English language version.

refsWebsite
Global rank English rank
355th place
454th place
low place
low place
383rd place
320th place
5,032nd place
3,357th place
low place
8,415th place
2nd place
2nd place
11th place
8th place
1st place
1st place
low place
low place
low place
low place
2,474th place
1,469th place
7,788th place
5,521st place
1,010th place
612th place
low place
low place
1,047th place
1,015th place
8,888th place
6,276th place
low place
low place
4,773rd place
3,130th place
214th place
176th place
69th place
59th place
low place
low place
1,272nd place
837th place
low place
8,965th place

arm.com

  • ARM corporation, ARM architecture reference manual ARMv8, for ARMv8-A architecture profile, document ARM DDI 0487C.a (ID121917), https://www.arm.com

arxiv.org

creativecommons.org

docs.google.com

doi.org

drdobbs.com

federalregister.gov

github.com

googleblog.com

security.googleblog.com

iacr.org

eprint.iacr.org

ietf.org

datatracker.ietf.org

keccak.team

lshift.net

nist.gov

csrc.nist.gov

  • Computer Security Division, Information Technology Laboratory (January 4, 2017). "Hash Functions | CSRC | CSRC". CSRC | NIST. Retrieved April 19, 2024.
  • "Hash Functions". NIST. June 22, 2020. Retrieved February 17, 2021.
  • "Announcing Request for Candidate Algorithm Nominations for a New Cryptographic Hash Algorithm (SHA-3) Family [U.S. Federal Register Vol. 72 No. 212)]" (PDF). November 2, 2007. Archived (PDF) from the original on March 31, 2011. Retrieved July 18, 2017.
  • "NIST Computer Security Division – The SHA-3 Cryptographic Hash Algorithm Competition, November 2007 – October 2012". January 4, 2017.
  • "SHA-3 standardization". NIST. Retrieved April 16, 2015.
  • Kelsey, John. "SHA3, Where We've Been, Where We're Going" (PDF). RSA Conference 2013.
  • "NIST hash forum mailing list". January 4, 2017.
  • "Moving Forward with SHA-3" (PDF).
  • NIST Computer Security Division (CSD). "SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions" (PDF). NIST.
  • Guo, Xu; Huang, Sinan; Nazhandali, Leyla; Schaumont, Patrick (August 2010), "Fair and Comprehensive Performance Evaluation of 14 Second Round SHA-3 ASIC Implementations" (PDF), NIST 2nd SHA-3 Candidate Conference: 12, retrieved February 18, 2011 Keccak is second only to Luffa, which did not advance to the final round.
  • "NIST.gov – Computer Security Division – Computer Security Resource Center". December 29, 2016.

nvlpubs.nist.gov

nist.gov

noekeon.org

keccak.noekeon.org

schneier.com

scottaaronson.com

semanticscholar.org

api.semanticscholar.org

sha-mbles.github.io

shattered.io

web.archive.org

wikichip.org

en.wikichip.org

yp.to

cr.yp.to

competitions.cr.yp.to

  • Bertoni, Guido; Daemen, Joan; Peeters, Michaël; Van Assche, Gilles; Van Keer, Ronny (March 13, 2014). "CAESAR submission: Ketje v1" (PDF). Retrieved February 29, 2020.
  • Bertoni, Guido; Daemen, Joan; Peeters, Michaël; Van Assche, Gilles; Van Keer, Ronny (March 13, 2014). "CAESAR submission: Keyak v1" (PDF). Retrieved February 29, 2020.

bench.cr.yp.to