Skip to main content

Hitachi
Research & Development

Supplemental Information

The following reports investigate the security and implementation aspects during the Round 1. We appreciate all of these contributions.

Security Analysis

Software Implementations

None.

Hardware Implementations

  • A.H. Namin and M.A. Hasan, `` Hardware implementation of the compression function for selected SHA-3 candidates,'' CACR 2009-28, July 2009.
  • Miroslav Knežević and Ingrid Verbauwhede, ``Hardware Evaluation of the Luffa Hash Family,'' COSIC internal report, 2009 (Not available).