Analysis of information sources in references of the Wikipedia article "اساچای-۱" in Persian language version.
{{cite journal}}
: Cite journal requires |journal=
(help)Unlike SHA-1 and SHA-2, Keccak does not have the length-extension weakness, hence does not need the HMAC nested construction. Instead, MAC computation can be performed by simply prepending the message with the key.