implementation of SHA-3 based on following KeccakNISTInterface.c from http://keccak.noekeon.org/ Following the naming conventions used in the C source code to enable easy review of the implementation.
Calculate the final hash value.
size of block that the compression function is applied to in bytes
See Implementation
implementation of SHA-3 based on following KeccakNISTInterface.c from http://keccak.noekeon.org/ Following the naming conventions used in the C source code to enable easy review of the implementation.