Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

State of the Hash: SHA-3 and Beyond

alghoritm, cryptography
Jean-Philippe Aumasson
Hashdays 2010
Indexed on
Mar 27, 2013
File name
File size
2.0 MB

After the AES Competition in the late 90s, the US NIST is now running a public competition to select the future cryptographic hash SHA-3. In this talk, we’ll present the motivations behind this initiative, with a focus on the only Swiss candidate BLAKE, which is one of the few candidates left in the competition. Then we’ll describe new results on one of the SHA-3 candidates, and we'll discuss the applicability of fault injection attacks to the HMAC construction. Finally, we’ll argue that SHA-3 is not the end of the road, since SHA-3 candidates are all software-oriented algorithms too demanding for constrainted environments, and we’ll present a proposal for a lightweight hash (previously presented at CHES 2010).

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.


Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.


To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !