This Standard specifies the Secure Hash Algorithm-3 (SHA-3) family of functions on
binary data. Each of the SHA-3 functions is based on an instance of the KECCAK
algorithm that NIST selected as the winner of the SHA-3 Cryptographic Hash Algorithm
Competition. This Standard also specifies the KECCAK-p family of mathematical
permutations, including the permutation that underlies KECCAK, in order to facilitate the
development of additional permutation-based cryptographic functions
read more.......http://csrc.nist.gov/groups/ST/hash/sha-3/documents/fips202_sha3_standard_draft_Apr2014.pdf
binary data. Each of the SHA-3 functions is based on an instance of the KECCAK
algorithm that NIST selected as the winner of the SHA-3 Cryptographic Hash Algorithm
Competition. This Standard also specifies the KECCAK-p family of mathematical
permutations, including the permutation that underlies KECCAK, in order to facilitate the
development of additional permutation-based cryptographic functions
read more.......http://csrc.nist.gov/groups/ST/hash/sha-3/documents/fips202_sha3_standard_draft_Apr2014.pdf