News

Serious Cryptography doesn't include the SHA-256 round function in detail, describing it only as "more complex than that of SHA-1" on p. 119. The pseudocode on Wikipedia uses the variables a, b, c, d, ...