The following reports investigate the security and implementation aspects
during the Round 1.
We appreciate all of these contributions.
Security Analysis
Software Implementations
None.
Hardware Implementations
- A.H. Namin and M.A. Hasan,
``
Hardware implementation of the compression function for selected SHA-3 candidates,''
CACR 2009-28, July 2009.
-
Miroslav Kneević and Ingrid Verbauwhede,
``Hardware Evaluation of the Luffa Hash Family,''
COSIC internal report, 2009 (Not available).