Hash mode interface to the Keccak code package. This program illustrates the use of the Keccak permutation. Usage is much more than a hash function. The NIST compatible settings are subject to change when they publish FIPS PUB 180-5. I wrote this program when evaluating the permutation and developing tree hashing for the Intel(R) MIC architecture.

Project Activity

See All Activity >

Categories

Cryptography

License

GNU General Public License version 3.0 (GPLv3)

Follow sha3sum and then some

sha3sum and then some Web Site

Other Useful Business Software
Our Free Plans just got better! | Auth0 Icon
Our Free Plans just got better! | Auth0

With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of sha3sum and then some!

Additional Project Details

Operating Systems

Linux, MinGW/MSYS2

Languages

English

Intended Audience

End Users/Desktop, Security, Security Professionals

User Interface

Command-line

Programming Language

C

Related Categories

C Cryptography Software

Registered

2013-11-29