
The competition of the NIST contenders in SHA-3 increased between the candidates hash functions to choose the winner in the end of 2012. However, NIST has outlined different requirements to measure different hash functions criteria such as, security, structure, and performance. Therefore, this paper addresses a comparative study of round 3 finalist SHA-3 candidates in, design of structure, complexity of security, with performance and cost, to measure the robustness of the algorithms through the Fundamentals Security Measurement Factors of Hash Function (FSMFHF) of Secure Hash Algorithm (SHA). For this reason, the result from this comprehensive comparison study between the finalist SHA-3 candidates such as, BLAKE, Grostl, JH, Keccak, and Skein, the Keccak, as well as JH are regarding the crucial competitors for the security future in the end of 2012, as a suitable designs for lightweight hash function. Whereas, Grostl hash function is tight in security, tight in structure of trade off (speed/memory) to implement in Virtex-7 2000T of FPGAs family hardware.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 6 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Top 10% | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Top 10% |
