Submissions were due October 31, 2008 and the list of candidates accepted for the first round was published on December 9, 2008. NIST held a conference in late February 2009 where submitters presented their algorithms and NIST officials discussed criteria for narrowing down the field of candidates for Round 2. The list of 14 candidates accepted to Round 2 was published on July 24, 2009. Another conference was held on August 23–24, 2010 (after CRYPTO 2010) at the University of California, Santa Barbara, where the second-round candidates were discussed. The announcement of the final round candidates occurred on December 10, 2010. On October 2, 2012, NIST announced its winner, choosing Keccak, created by Guido Bertoni, Joan Daemen, and Gilles Van Assche of STMicroelectronics and Michaël Peeters of NXP.
This is an incomplete list of known submissions.
NIST selected 51 entries for round 1. 14 of them advanced to round 2, from which 5 finalists were selected.
NIST selected five SHA-3 candidate algorithms to advance to the third (and final) round:
NIST noted some factors that figured into its selection as it announced the finalists:
NIST has released a report explaining its evaluation algorithm-by-algorithm.
The following hash function submissions were accepted for round two, but did not make it to the final round. As noted in the announcement of the finalists, "none of these candidates was clearly broken".
The following hash function submissions were accepted for round one but did not pass to round two. They have neither been conceded by the submitters nor have had substantial cryptographic weaknesses. However, most of them have some weaknesses in the design components, or performance issues.
The following non-conceded round one entrants have had substantial cryptographic weaknesses announced:
The following round one entrants have been officially retracted from the competition by their submitters; they are considered broken according to the NIST official round one candidates web site. As such, they are withdrawn from the competition.
Several submissions received by NIST were not accepted as first-round candidates, following an internal review by NIST. In general, NIST gave no details as to why each was rejected. NIST also has not given a comprehensive list of rejected algorithms; there are known to be 13, but only the following are public.
"Federal Register / Vol. 72, No. 212" (PDF). Federal Register. Government Printing Office. November 2, 2007. Retrieved November 6, 2008. http://csrc.nist.gov/groups/ST/hash/documents/FR_Notice_Nov07.pdf
"cryptographic hash project – Background Information". Computer Security Resource Center. National Institute of Standards and Technology. November 2, 2007. Retrieved November 6, 2008. http://csrc.nist.gov/groups/ST/hash/index.html
"NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition". NIST. October 2, 2012. Retrieved October 2, 2012. https://www.nist.gov/itl/csd/sha-100212.cfm
"Round 1". December 9, 2008. Retrieved December 10, 2008. http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/index.html
National Institute of Standards and Technology (December 9, 2008). "The First SHA-3 Candidate Conference". Retrieved December 23, 2008. http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/Feb2009/index.html
"Second Round Candidates". National Institute for Standards and Technology. July 24, 2009. Retrieved July 24, 2009. http://csrc.nist.gov/groups/ST/hash/sha-3/Round2/submissions_rnd2.html
National Institute of Standards and Technology (June 30, 2010). "The Second SHA-3 Candidate Conference". http://csrc.nist.gov/groups/ST/hash/sha-3/Round2/Aug2010/
"Tentative Timeline of the Development of New Hash Functions". NIST. December 10, 2008. Retrieved September 15, 2009. http://csrc.nist.gov/groups/ST/hash/timeline.html
"NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition". NIST. October 2, 2012. Retrieved October 2, 2012. https://www.nist.gov/itl/csd/sha-100212.cfm
"Round 1". December 9, 2008. Retrieved December 10, 2008. http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/index.html
"Second Round Candidates". National Institute for Standards and Technology. July 24, 2009. Retrieved July 24, 2009. http://csrc.nist.gov/groups/ST/hash/sha-3/Round2/submissions_rnd2.html
NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition https://www.nist.gov/itl/csd/sha-100212.cfm
Third (Final) Round Candidates Retrieved 9 Nov 2011 http://csrc.nist.gov/groups/ST/hash/sha-3/Round3/submissions_rnd3.html
SHA-3 Finalists Announced by NIST Archived July 9, 2011, at the Wayback Machine, blog post quoting NIST's announcement in full. http://crypto.junod.info/2010/12/10/sha-3-finalists-announced-by-nist/
Status Report on the first round of the SHA-3 Cryptographic Hash Algorithm Competition (PDF). http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/sha3_NISTIR7620.pdf
Status Report on the second round of the SHA-3 Cryptographic Hash Algorithm Competition (PDF). Retrieved 2 March 2011 http://csrc.nist.gov/groups/ST/hash/sha-3/Round2/documents/Round2_Report_NISTIR_7764.pdf
Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition (PDF). http://nvlpubs.nist.gov/nistpubs/ir/2012/NIST.IR.7896.pdf
Svein Johan Knapskog; Danilo Gligoroski; Vlastimil Klima; Mohamed El-Hadedy; Jørn Amundsen; Stig Frode Mjølsnes (November 4, 2008). "blue_midnight_wish". Retrieved November 10, 2008. http://www.item.ntnu.no/people/personalpages/fac/danilog/blue_midnight_wish
Søren S. Thomsen (2009). "Pseudo-cryptanalysis of Blue Midnight Wish" (PDF). Archived from the original (PDF) on September 2, 2009. Retrieved May 19, 2009. https://web.archive.org/web/20090902193808/http://www2.mat.dtu.dk/people/S.Thomsen/bmw/bmw-pseudo.pdf
Henri Gilbert; Ryad Benadjila; Olivier Billet; Gilles Macario-Rat; Thomas Peyrin; Matt Robshaw; Yannick Seurin (October 29, 2008). "SHA-3 Proposal: ECHO" (PDF). Retrieved December 11, 2008. http://ehash.iaik.tugraz.at/uploads/9/91/Echo.pdf
Özgül Kücük (October 31, 2008). "The Hash Function Hamsi" (PDF). Retrieved December 11, 2008. http://ehash.iaik.tugraz.at/uploads/9/95/Hamsi.pdf
Dai Watanabe; Christophe De Canniere; Hisayoshi Sato (October 31, 2008). "Hash Function Luffa: Specification" (PDF). Retrieved December 11, 2008. http://ehash.iaik.tugraz.at/uploads/e/ea/Luffa_Specification.pdf
Jean-François Misarsky; Emmanuel Bresson; Anne Canteaut; Benoît Chevallier-Mames; Christophe Clavier; Thomas Fuhr; Aline Gouget; Thomas Icart; Jean-François Misarsky; Marìa Naya-Plasencia; Pascal Paillier; Thomas Pornin; Jean-René Reinhard; Céline Thuillet; Marion Videau (October 28, 2008). "Shabal, a Submission to NIST's Cryptographic Hash Algorithm Competition" (PDF). Retrieved December 11, 2008. /wiki/Anne_Canteaut
Eli Biham; Orr Dunkelman. "The SHAvite-3 Hash Function" (PDF). Retrieved December 11, 2008. http://ehash.iaik.tugraz.at/uploads/f/f5/Shavite.pdf
Jongin Lim; Donghoon Chang; Seokhie Hong; Changheon Kang; Jinkeon Kang; Jongsung Kim; Changhoon Lee; Jesang Lee; Jongtae Lee; Sangjin Lee; Yuseop Lee; Jaechul Sung (October 29, 2008). "ARIRANG" (PDF). Retrieved December 11, 2008. http://ehash.iaik.tugraz.at/uploads/2/2c/Arirang.pdf
Philip Hawkes; Cameron McDonald (October 30, 2008). "Submission to the SHA-3 Competition: The CHI Family of Cryptographic Hash Algorithms" (PDF). Retrieved November 11, 2008. http://ehash.iaik.tugraz.at/uploads/2/2c/Chi_submission.pdf
Jacques Patarin; Louis Goubin; Mickael Ivascot; William Jalby; Olivier Ly; Valerie Nachef; Joana Treger; Emmanuel Volte. "CRUNCH". Archived from the original on January 29, 2009. Retrieved November 14, 2008. https://web.archive.org/web/20090129125541/http://voltee.com/crunch/
Hirotaka Yoshida; Shoichi Hirose; Hidenori Kuwakado (October 30, 2008). "SHA-3 Proposal: Lesamnta" (PDF). Retrieved December 11, 2008. http://ehash.iaik.tugraz.at/uploads/5/5c/Lesamnta.pdf
Kerem Varıcı; Onur Özen; Çelebi Kocair. "The Sarmal Hash Function". Archived from the original on June 11, 2011. Retrieved October 12, 2010. https://web.archive.org/web/20110611091218/http://homes.esat.kuleuven.be/~kvarici/sarmal_hash.html
Daniel Penazzi; Miguel Montes. "The TIB3 Hash" (PDF). Retrieved November 29, 2008.[permanent dead link] http://www.famaf.unc.edu.ar/~penazzi/tib3/submitted/Supporting_Documentation/TIB3_Algorithm_Specification.pdf
Tetsu Iwata; Kyoji Shibutani; Taizo Shirai; Shiho Moriai; Toru Akishita (October 31, 2008). "AURORA: A Cryptographic Hash Algorithm Family" (PDF). Retrieved December 11, 2008. http://ehash.iaik.tugraz.at/uploads/b/ba/AURORA.pdf
Niels Ferguson; Stefan Lucks (2009). "Attacks on AURORA-512 and the Double-MIX Merkle–Damgård Transform" (PDF). Retrieved July 10, 2009. /wiki/Niels_Ferguson
Colin Bradbury (October 25, 2008). "BLENDER: A Proposed New Family of Cryptographic Hash Algorithms" (PDF). Retrieved December 11, 2008. http://ehash.iaik.tugraz.at/uploads/5/5e/Blender.pdf
Craig Newbold. "Observations and Attacks On The SHA-3 Candidate Blender" (PDF). Retrieved December 23, 2008. http://ehash.iaik.tugraz.at/uploads/2/20/Observations_on_Blender.pdf
Florian Mendel. "Preimage Attack on Blender" (PDF). Retrieved December 23, 2008. http://ehash.iaik.tugraz.at/uploads/4/48/Blender-preimage.pdf
Dmitry Khovratovich; Alex Biryukov; Ivica Nikolić (October 30, 2008). "The Hash Function Cheetah: Specification and Supporting Documentation" (PDF). Retrieved December 11, 2008. http://ehash.iaik.tugraz.at/uploads/c/ca/Cheetah.pdf
Danilo Gligoroski (December 12, 2008). "Danilo Gligoroski – Cheetah hash function is not resistant against length-extension attack". Retrieved December 21, 2008. http://ehash.iaik.tugraz.at/uploads/d/d9/Cheetah_length-extension.txt
Zijie Xu. "Dynamic SHA" (PDF). Retrieved December 11, 2008. http://ehash.iaik.tugraz.at/uploads/e/e2/DyamicSHA.pdf
Vlastimil Klima (December 14, 2008). "Dynamic SHA is vulnerable to generic attacks". Retrieved December 21, 2008. http://ehash.iaik.tugraz.at/uploads/e/e7/Dynamic-sha_length-extension.txt
Zijie Xu. "Dynamic SHA2" (PDF). NIST. Retrieved December 11, 2008. http://ehash.iaik.tugraz.at/uploads/5/5b/DyamicSHA2.pdf
Vlastimil Klima (December 14, 2008). "Dynamic SHA2 is vulnerable to generic attacks". Retrieved December 21, 2008. http://ehash.iaik.tugraz.at/uploads/0/0e/Dynamic-sha2_length-extension.txt
Danilo Gligoroski; Rune Steinsmo Ødegård; Marija Mihova; Svein Johan Knapskog; Ljupco Kocarev; Aleš Drápal (November 4, 2008). "edon-r". Retrieved November 10, 2008. http://www.item.ntnu.no/people/personalpages/fac/danilog/edon-r
Dmitry Khovratovich; Ivica Nikolić; Ralf-Philipp Weinmann (2008). "Cryptanalysis of Edon-R" (PDF). Retrieved July 10, 2009. http://ehash.iaik.tugraz.at/uploads/7/74/Edon.pdf
Sean O'Neil; Karsten Nohl; Luca Henzen (October 31, 2008). "EnRUPT – The Simpler The Better". Retrieved November 10, 2008. http://www.enrupt.com/
Sebastiaan Indesteege (November 6, 2008). "Collisions for EnRUPT". Archived from the original on February 18, 2009. Retrieved November 7, 2008. https://web.archive.org/web/20090218093632/http://homes.esat.kuleuven.be/~sindeste/enrupt.html
Jason Worth Martin (October 21, 2008). "ESSENCE: A Candidate Hashing Algorithm for the NIST Competition" (PDF). Archived from the original (PDF) on June 12, 2010. Retrieved November 8, 2008. https://web.archive.org/web/20100612084041/http://www.math.jmu.edu/~martin/essence/Supporting_Documentation/essence_NIST.pdf
"Cryptanalysis of ESSENCE" (PDF). http://www.131002.net/data/papers/NRALLMP09.pdf
Ivica Nikolić; Alex Biryukov; Dmitry Khovratovich. "Hash family LUX – Algorithm Specifications and Supporting Documentation" (PDF). Retrieved December 11, 2008. http://ehash.iaik.tugraz.at/uploads/f/f3/LUX.pdf
Mikhail Maslennikov. "MCSSHA-3 hash algorithm". Archived from the original on May 2, 2009. Retrieved November 8, 2008. https://web.archive.org/web/20090502224350/http://registercsp.nets.co.kr/hash_competition.htm
Jean-Philippe Aumasson; María Naya-Plasencia. "Second preimages on MCSSHA-3" (PDF). Retrieved November 14, 2008.[permanent dead link] http://131002.net/data/papers/AN.pdf
Peter Maxwell (September 2008). "The Sgàil Cryptographic Hash Function" (PDF). Archived from the original (PDF) on November 12, 2013. Retrieved November 9, 2008. https://web.archive.org/web/20131112211946/http://www.allicient.co.uk/files/sgail/Supporting_Documentation/specification.pdf
Peter Maxwell (November 5, 2008). "Aww, p*sh!". Archived from the original on November 9, 2008. Retrieved November 6, 2008. https://web.archive.org/web/20081109065226/http://www.allicient.co.uk/2008/11/05/aww-psh/
Michael Gorski; Ewan Fleischmann; Christian Forler (October 28, 2008). "The Twister Hash Function Family" (PDF). Retrieved December 11, 2008. http://ehash.iaik.tugraz.at/uploads/3/39/Twister.pdf
Florian Mendel; Christian Rechberger; Martin Schläffer (2008). "Cryptanalysis of Twister" (PDF). Retrieved May 19, 2009. http://ehash.iaik.tugraz.at/uploads/d/dd/Twister_attack.pdf
Michael Kounavis; Shay Gueron (November 3, 2008). "Vortex: A New Family of One Way Hash Functions based on Rijndael Rounds and Carry-less Multiplication". Retrieved November 11, 2008. http://eprint.iacr.org/2008/464
Jean-Philippe Aumasson; Orr Dunkelman; Florian Mendel; Christian Rechberger; Søren S. Thomsen (2009). "Cryptanalysis of Vortex" (PDF). Retrieved May 19, 2009. http://www.131002.net/data/papers/ADMRT09.pdf
Computer Security Division, Information Technology Laboratory (January 4, 2017). "SHA-3 Project – Hash Functions". CSRC: NIST. Retrieved April 26, 2019. https://csrc.nist.gov/projects/hash-functions/sha-3-project
"Round 1". December 9, 2008. Retrieved December 10, 2008. http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/index.html
Neil Sholer (October 29, 2008). "Abacus: A Candidate for SHA-3" (PDF). Retrieved December 11, 2008. http://ehash.iaik.tugraz.at/uploads/b/be/Abacus.pdf
Gregory G. Rose. "Design and Primitive Specification for Boole" (PDF). Retrieved November 8, 2008. http://ehash.iaik.tugraz.at/uploads/3/37/BoolePaper.pdf
Gregory G. Rose (December 10, 2008). "Official Comment: Boole" (PDF). Retrieved December 23, 2008. http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/BOOLE_Comments.pdf
"Round 1". December 9, 2008. Retrieved December 10, 2008. http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/index.html
David A. Wilson (October 23, 2008). "The DCH Hash Function" (PDF). Retrieved November 23, 2008. http://web.mit.edu/dwilson/www/hash/dch/Supporting_Documentation/dch.pdf
"Round 1". December 9, 2008. Retrieved December 10, 2008. http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/index.html
Natarajan Vijayarangan. "A New Hash Algorithm: Khichidi-1" (PDF). Retrieved December 11, 2008. http://ehash.iaik.tugraz.at/uploads/d/d4/Khichidi-1.pdf
"Round 1". December 9, 2008. Retrieved December 10, 2008. http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/index.html
Björn Fay. "MeshHash" (PDF). Retrieved November 30, 2008. http://ehash.iaik.tugraz.at/uploads/5/5a/Specification_DIN-A4.pdf
"Round 1". December 9, 2008. Retrieved December 10, 2008. http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/index.html
Orhun Kara; Adem Atalay; Ferhat Karakoc; Cevat Manap. "SHAMATA hash function: A candidate algorithm for NIST competition". Archived from the original on February 1, 2009. Retrieved November 10, 2008. https://web.archive.org/web/20090201153442/http://www.uekae.tubitak.gov.tr/home.do?ot=1&sid=601&pid=547
"Round 1". December 9, 2008. Retrieved December 10, 2008. http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/index.html
Michal Trojnara (October 14, 2008). "StreamHash Algorithm Specifications and Supporting Documentation" (PDF). Retrieved December 15, 2008. http://ehash.iaik.tugraz.at/uploads/0/09/Streamhash.pdf
"Round 1". December 9, 2008. Retrieved December 10, 2008. http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/index.html
Rafael Alvarez; Gary McGuire; Antonio Zamora. "The Tangle Hash Function" (PDF). Retrieved December 11, 2008. http://ehash.iaik.tugraz.at/uploads/4/40/Tangle.pdf
John Washburn. "WaMM: A Candidate Algorithm for the SHA-3 Competition" (PDF). Archived from the original (PDF) on April 19, 2009. Retrieved November 9, 2008. https://web.archive.org/web/20090419085817/http://www.washburnresearch.org/cryptography/archive/WaMM-SHA3.pdf
"Official Comment: WaMM is Withdrawn" (PDFauthor=John Washburn). December 20, 2008. Retrieved December 23, 2008. http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/WaMM_Comments.pdf
Bob Hattersly (October 15, 2008). "Waterfall Hash – Algorithm Specification and Analysis" (PDF). Retrieved November 9, 2008. http://ehash.iaik.tugraz.at/uploads/1/19/Waterfall_Specification_1.0.pdf
Bob Hattersley (December 20, 2008). "Official Comment: Waterfall is broken" (PDF). Retrieved December 23, 2008. http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/Waterfall_Comments.pdf
"Round 1". December 9, 2008. Retrieved December 10, 2008. http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/index.html
"Round 1". December 9, 2008. Retrieved December 10, 2008. http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/index.html
Bruce Schneier (November 19, 2008). "Skein and SHA-3 News". Retrieved December 23, 2008. http://www.schneier.com/blog/archives/2008/11/skein_and_sha-3.html
Robert J. Jenkins Jr. "Algorithm Specification". Retrieved December 15, 2008. http://burtleburtle.net/bob/crypto/maraca/nist/
Anne Canteaut & María Naya-Plasencia. "Internal collision attack on Maraca" (PDF). Retrieved December 15, 2008. http://ehash.iaik.tugraz.at/uploads/5/52/Maraca.pdf
Michael P. Frank. "Algorithm Specification for MIXIT: a SHA-3 Candidate Cryptographic Hash Algorithm" (PDF). Archived from the original (PDF) on March 4, 2016. Retrieved January 12, 2014. https://web.archive.org/web/20160304051325/https://dl.dropboxusercontent.com/u/3133557/Bitcoin/mixit-spec.pdf
Geoffrey Park. "NKS 2D Cellular Automata Hash" (PDF). Retrieved November 9, 2008. http://geoffrey.park.googlepages.com/SHA3Submission01.pdf
Cristophe De Cannière (November 13, 2008). "Collisions for NKS2D-224". Retrieved November 14, 2008. http://ehash.iaik.tugraz.at/uploads/3/3f/NK2SD-224.txt
Brandon Enright (November 14, 2008). "Collisions for NKS2D-512". Retrieved November 14, 2008. http://ehash.iaik.tugraz.at/uploads/9/93/NK2SD-512.txt
Peter Schmidt-Nielsen. "Ponic" (PDF). Retrieved November 9, 2008. http://ehash.iaik.tugraz.at/uploads/3/3c/PonicSpecification.pdf
María Naya-Plasencia. "Second preimage attack on Ponic" (PDF). Retrieved November 30, 2008. http://131002.net/data/papers/ponic.pdf
Nicolas T. Courtois; Carmi Gressel; Avi Hecht; Gregory V. Bard; Ran Granot. "ZK-Crypt Homepage". Archived from the original on February 9, 2009. Retrieved March 1, 2009. https://web.archive.org/web/20090209040334/http://fortressgb.com/apage/39649.php