We attempted to make design choices according to requirements derived from the identified needs of future SHA3 users, as in a typical engineering project. This chapter is structured as follows: Section 7.1 first summarizes the requirements defined by NIST in its call for proposals, from minimal acceptance criteria to strict security requirements.
|Title of host publication||Information Security and Cryptography|
|Number of pages||23|
|Publication status||Published - 2014|
|Name||Information Security and Cryptography|