Top IT Security Bloggers

SHA-3 hash competition concludes, and the winner is...Keccak!

Five years, 64 entries and three rounds of cryptographic cook-off later, and we finally have a winner of the Secure Hash Algorithm 3 competition: Keccak.

We explain how it's different, and why, and we tell you how to pronounce it...

Read the full article