FIPS PUB 202 - SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions
August 2015 - The FIPS 202 standard defines:
the Keccak-p permutations,
the sponge construction,
the Keccak sponge function,
the SHAKE128 and SHAKE256 extendable-output functions,
the SHA3-224, SHA3-256, SHA3-384 and SHA3-512 hash functions.
NIST Special Publication 800-185 - SHA-3 Derived Functions: cSHAKE, KMAC, TupleHash and ParallelHash
December 2016 - The SP 800-185 standard defines:
the cSHAKE extendable-output functions (cSHAKE128 and cSHAKE256),
the KMAC pseudo-random functions (KMAC128, KMACXOF128, KMAC256, KMACXOF256),
the TupleHash extendable-output and hash functions (TupleHash128, TupleHashXOF128, TupleHash256, TupleHashXOF256),
the ParallelHash extendable-output and hash functions (ParallelHash128, ParallelHashXOF128, ParallelHash256, ParallelHashXOF256),
3GPP TS 35.231 - Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP
authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*
October 2014 - The 3GPP TS 35.231 standard defines:
TUAK, an authentication and key generation algorithm for mobile telephony, based on Keccak.
KangarooTwelve
August 2016 - This document defines:
the KangarooTwelve extendable-output and hash function,
the MarsupilamiFourteen extendable-output and hash function.
CAESAR submission: Ketje v2
September 2016 - This document defines:
the MonkeyDuplex construction,
the MonkeyWrap authenticated encryption mode,
the Ketje authenticated encryption schemes (Kejte Jr, Kejte Sr, Kejte Minor and Kejte Major).
CAESAR submission: Keyak v2
September 2016 - This document defines:
the Motorist authenticated encryption mode,
the Keyak authenticated encryption schemes (River Keyak, Lake Keyak, Sea Keyak, Ocean Keyak and Lunar Keyak).