ࡱ> kmj bjbjDD .*&c&c ,?,qkkkkkFFFpqqqqqq$sev$qFF$qkk9qL=== kkp=p==rh4nk0'Z j>pq<qjw"w|nnLwnFZ=h tFFF$q$q3 FFFqwFFFFFFFFF : Hash Submissions Evaluation Procedure [Shu-jen should post a message to remind potential contenders to double check their submission package before sending to NIST. No warnings will be given by NIST for incomplete submissions that are received after 8/31/08.] Early submissions (by 8/31/08): Shu-jen receives a submission package. She checks the package in general, and the Cover Sheet and IP Statements specifically. Then she checks off items that are completely specified, and mark any deficiencies in the Checklist. Shu-jen makes a copy of the submission documentation as the working draft for technical review, and stores the original submission package, which will remain intact, and the working draft separately in a safe. Shu-jen assigns a technical team to assess the technical contents for submission completeness. The reviewers shall schedule their reviews with Shu-jen so that the working draft can be retrieved from the safe and provided to the reviewer for evaluation in the lab (A368). Shu-jen will also provide a checklist for the reviewer to use. The review at this stage is aimed to determine whether a submission is complete and proper, not to determine the technical merits. Therefore, the reviewers shall focus on whether a submission meets the specific requirements stated in Sections 2.B.1, 2.B.4, 2.B.5, 2.B.6 and Section 3. These sections are highlighted in red in the Checklist; the technical reviewers are requested to review only these sections. The reviewers shall mark any deficiencies in the submission package or check off completed items. When a reviewer finishes a review, he/she shall return the working draft and the completed Checklist to Shu-jen to be stored in the safe. The optical media and a partially-filled Submission Checklist will be stored in the safe as well for Larry Bassham to check for submission completeness (Reference and Optimized implementations, KATs, MCTs, etc.). Larry shall check off items that are completely specified, or mark any deficiencies in the Checklist. Once a submission has been reviewed by the various teams, Shu-jen will review all the checklists and determine whether a submission is complete and proper. She will consult the review teams if conflicting views have been expressed on a submission. If a submission is complete and proper, Shu-jen will notify Sara Caswell to post the package after the final submission deadline (which is Oct. 31, 2008). If any deficiency is found in a package, Shu-jen will notify the submitter before 9/30/2008 so that the package can be amended. Submissions received after 8/31/08 but before the final submission deadline: Shu-jen receives a submission package. She checks the package in general, and the Cover Sheet and IP Statements specifically. Then she checks off items that are completely specified, and mark any deficiencies in the Checklist. If a deficiency is found, the package is rejected and the submitter is notified; otherwise, Shu-jen proceeds to Step 2. [Same as Steps 2-7 above.] [Same as Step 8 above with the exception that a package that is not complete and proper will be discarded and the submitter is notified of the rejection.] Submissions received after 10/31/08 Shu-jen will discard late submissions and notify the submitters. %&/679EXgns    $ % & ' - 7 8 D K Q \ d n o w x ˿ϷhTmh7'|h{hJchycphnrhghqha=5 h 5hqh 5hlhD)hqh 9hB3hqhq5#hqhg5PJmH nHsH tH#hqhq5PJmH nHsH tH8&  % & RI & FEƀ F.gd8bI & FEƀ F.gdJcgd gdB3$dd[$\$a$gdq    = R g s t  9 : z } ( )  G %&',-@ABHpsx#'hEh6$hxh{hdhnhUh7 hOghOghWhTmhm{jhycphOghJcL ) 'k!I & FEƀ F.gd8bI & FEƀ F.gd8bI & FEƀ F.gdOg'1<JKXYs$&'-.3:>BLMSZ[$139<OUh#6ļļhqh8b5hqh 5hycph2c1hKM+hNh54h$Fph1h>h{h7'|hJchEh6$Jk!I & FEƀ F.gd8bI & FEƀ F.gd8bI & FEƀ F.gdJcQRfI & FEƀ F.gd8bI & FEƀ F.gdo+gd 6GOPQR58GH":;FIQUYbcdef¾ѾѺѺѳѺѺٺѯѺٝ h2c1ho+h:v h2c1hOz h2c1h  h2c1h2c1hg h$Fph$FphH h$FphY/hZWh>h8bh@J hOzhnrhnrh2ho+hqha=5 h 5hqh 5hqh8b5 ho+54efgd 9gdZWgd I & FEƀ F.gd$Fp hhOz,1h/ =!"#$% t2&6FVfv2(&6FVfv&6FVfv&6FVfv&6FVfv&6FVfv&6FVfv8XV~ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@6PJ_HmH nH sH tH D`D /mnNormalCJPJ_HaJmH sH tH DA D Default Paragraph FontRiR  Table Normal4 l4a (k (No List 66 ZTOC 3 5CJaJ4U4 N Hyperlink >*ph@@  Comment Text PJnHtHB'!B AComment ReferenceCJaJPjP AComment Subject5CJPJ\aJtH HBH A Balloon TextCJOJQJ^JaJPK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭VGRU1a$N% ʣꂣKЛjVkUDRKQj/dR*SxMPsʧJ5$4vq^WCʽ D{>̳`3REB=꽻Ut Qy@֐\.X7<:+& 0h @>nƭBVq1u`X=:tڣf{Xx {dV=|kPo۵(h[x )IеnW[@;0PDbRy( "IROnVxCD' bJZ65I[adH+^D )>s=h ۟~7zWo^=[Qr||[?|̦ o{O=4?}}L$Xx%@|Ư'11%i$P,c[GD7sH5. 4kIƉZKTPBM HN7|nB#L7^`!\29pCH3nMb#$.'19b%+vJ~.!DI;DPz l 2I ͚;|y3+~Dؕjw0e1vdǪzO^I57y+d8bnv 4?6CK\M#= ċ(0'1 zxpWc/_X4/A_[)^&(fp[_NiK7@wd5= I?>_q샏[ꚝΡdrv5CojFh>PG3mOs=͡|7n;:N&?\8Lټ@_<}9H}]Ru Vx~p{3AsP~\v!cZ 6JOw׃SB HfЖ gpj*4nR2BM} rfw[BfV= vͅh7/sɳ ̲B3뤓eH=J_:hn$O\ʧFn;/x.M#+d,W87+IwOťwF) uepwPϬ pV$2v Sv(C8L\~+l`k& Y iTU#p~XHYHeʹ,fͰ-;Y7XmM 9ͬYMm*/稺W(r2bUGڱ]]HYUcF8U~ۍZZnJmi}kn^l =* '6   8@0(  B S  ?u  " 8*urn:schemas-microsoft-com:office:smarttagsdate =9/2008318DayMonthYear  $  80N`A=NhJk m"NK N"#l]'rKrJ*kN6 ,xk@ 7@hV1;|lF*@УAUq^AXt>Im)BBʤZLHP$mvU9s`$@cg|cd|tdH]6UgD6sj0h|"Nfl*|Lg/nuy,z6J,m_zL~PB$hhh^h`B*OJQJo(phhHh88^8`OJQJ^Jo(hHoh^`OJQJo(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJQJo(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`B*OJQJo(phhHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh88^8`B*OJQJo(phhHh^`OJQJ^Jo(hHoh  ^ `OJQJo(hHh  ^ `OJQJo(hHhxx^x`OJQJ^Jo(hHohHH^H`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`B*OJQJo(phhHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`B*OJQJo(phhHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`B*OJQJo(phhHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hH^`B*OJQJo(phhH^`OJQJ^Jo(hHopp^p`OJQJo(hH@ @ ^@ `OJQJo(hH^`OJQJ^Jo(hHo^`OJQJo(hH^`OJQJo(hH^`OJQJ^Jo(hHoPP^P`OJQJo(hHh^`B*OJQJo(phhHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`B*OJQJo(phhHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh hh^h`hH.h 88^8`hH.h L^`LhH.h   ^ `hH.h   ^ `hH.h xLx^x`LhH.h HH^H`hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h pLp^p`LhH.h @ @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PLP^P`LhH.h^`B*OJQJo(phhHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`B*OJQJo(phhHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHhhh^h`B*OJQJo(phhHh88^8`OJQJ^Jo(hHoh^`OJQJo(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJQJo(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`B*OJQJo(phhHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hH^`B*OJQJo(phhH^`OJQJ^Jo(hHopp^p`OJQJo(hH@ @ ^@ `OJQJo(hH^`OJQJ^Jo(hHo^`OJQJo(hH^`OJQJo(hH^`OJQJ^Jo(hHoPP^P`OJQJo(hHhhh^h`B*OJQJo(phhHh88^8`OJQJ^Jo(hHoh^`OJQJo(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJQJo(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hH^`B*OJQJo(phhH^`OJQJ^Jo(hHopp^p`OJQJo(hH@ @ ^@ `OJQJo(hH^`OJQJ^Jo(hHo^`OJQJo(hH^`OJQJo(hH^`OJQJ^Jo(hHoPP^P`OJQJo(hHhhh^h`B*OJQJo(phhHh88^8`OJQJ^Jo(hHoh^`OJQJo(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJQJo(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`B*OJQJo(phhHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hH88^8`CJOJQJo(^`CJOJQJo(o  ^ `CJOJQJo(  ^ `CJOJQJo(xx^x`CJOJQJo(HH^H`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(#88^8`56CJOJQJaJo(hH.h,^`56B*CJOJQJaJo(phhHh$ $ ^$ `56CJaJo(hH. @ @ ^@ `o(hH. ^`o(hH. L^`Lo(hH. ^`o(hH. ^`o(hH. PLP^P`Lo(hH.h^`B*OJQJo(phhHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHhhh^h`B*OJQJo(phhHh88^8`B*OJQJo(phhH^`OJQJo(hH  ^ `OJQJo(hH  ^ `OJQJ^Jo(hHoxx^x`OJQJo(hHHH^H`OJQJo(hH^`OJQJ^Jo(hHo^`OJQJo(hH#88^8`56CJOJQJaJo(hH.h^`56CJaJo(hH. pLp^p`Lo(hH. @ @ ^@ `o(hH. ^`o(hH. L^`Lo(hH. ^`o(hH. ^`o(hH. PLP^P`Lo(hH.^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(h^`B*o(phhH.h^`B*OJQJo(phhHpp^p`OJQJo(hH@ @ ^@ `OJQJo(hH^`OJQJ^Jo(hHo^`OJQJo(hH^`OJQJo(hH^`OJQJ^Jo(hHoPP^P`OJQJo(hHh hh^h`hH.h 88^8`hH.h L^`LhH.h   ^ `hH.h   ^ `hH.h xLx^x`LhH.h HH^H`hH.h ^`hH.h L^`LhH.k@ 7s`,m_z0|tdNV1;]'JJ*F*@8,zN"#ZLHUq^Ag/ncg|cA=m"gIm)Buysj"NflvUL~6 ,Yn;        Yn;        Yn;        Yn;        Yn;        Yn;        Yn;        Yn;        Yn;                          Yn;        Yn;        Yn;        Yn;        Yn;        Yn;        Yn;        Yn;        Yn;        Yn;        Yn;Yn;        Yn;                D#`/ u-D#`/ uaRyaRyq2G~-@Pm<Wlrs-/ W `  On!_c a=l&  =%M%[%D)F+KM+o+I/12c12B3Ou8 9Cu;R<LBSCPmQ$SY^ScS*TpUiYz*ZW{`(a+ad4!fOgngm{jlmTmn/mno$Fpycpq 5rnrKsRtnx=z{n{7'|1W[N%U{5oZUOz7ZWBk7FYlY/D8b#4ETgZ%bJc6$J&HA54X[ [vc;x>gN'fRgU:v>@JS @ @UnknownComputer Security DivisionG*Ax Times New Roman5Symbol3. *Cx ArialC (PMingLiUe0}fԚ5..[`)Tahoma?= *Cx Courier New;WingdingsA$BCambria Math"hLGLG<æ 4 4!r4  2qHP)?n2!xx Cryptographic Hash Competition Shu-jen ChangKerman, Sara J. (Fed)|                       Oh+'0 8D d p |  Cryptographic Hash CompetitionShu-jen Chang Normal.dotmKerman, Sara J. (Fed)2Microsoft Office Word@F#@<Χ@X!Z@X!Z ՜.+,0  hp  NIST4  Cryptographic Hash Competition Title  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXY[\]^_`acdefghilRoot Entry FT'ZnData 1TablewWordDocument.*SummaryInformation(ZDocumentSummaryInformation8bCompObjr  F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q