Language:
    • Available Formats
    • Options
    • Availability
    • Priced From ( in USD )
    • Secure PDF 🔒
    • 👥
    • Immediate download
    • $332.92
    • Add to Cart
    • Printed Edition
    • Ships in 1-2 business days
    • $369.54
    • Add to Cart
    • Printed Edition + PDF
    • Immediate download
    • $466.10
    • Add to Cart

Customers Who Bought This Also Bought

 

About This Item

 

Full Description

The objective of this Standard is to specify dedicated hash-functions, i.e. specially designed hash-functions. The hash-functions in this document are based on the iterative use of a round-function. Distinct round-functions are specified, giving rise to distinct dedicated hash-functions.
 

Document History

  1. AS ISO/IEC 10118.3:2019

    👀 currently
    viewing


    IT Security techniques - Hash-functions, Part 3: Dedicated hash-functions

    • Most Recent
  2. AS ISO IEC 10118.3 SUPP 1-2006


    Information technology - Security techniques - Hash-functions, Part 3: Dedicated hash-functions - Supplement 1: Dedicated Hash-Function 8 (SHA-224) (Supplement to AS ISO/IEC 10118.3-2006)

    • Historical Version
  3. AS ISO/IEC 10118.3 SUPP 1-2006


    Information technology - Security techniques - Hash-functions, Part 3: Dedicated hash-functions - Supplement 1: Dedicated Hash-Function 8 (SHA-224) (Supplement to AS ISO/IEC 10118.3-2006)

    • Historical Version
  4. AS ISO IEC 10118.3-2006


    Information technology - Security techniques - Hash-functions, Part 3: Dedicated hash-functions

    • Historical Version
  5. AS ISO/IEC 10118.3-2006


    Information technology - Security techniques - Hash-functions, Part 3: Dedicated hash-functions

    • Historical Version
  6. AS 2805.13.2-2000


    Electronic funds transfer, Part 13.2: Requirements for interfaces - Secure hash functions

    • Historical Version