Sha 3
A Keccak-based cryptographic hash function available in SORA Nexus for domains requiring NIST-standardized hashing. While Poseidon2 over Goldilocks is used for internal traces and sparse Merkle trees, SHA-3 provides compatibility with external systems and regulatory requirements that mandate NIST-approved algorithms.
Sha 3
CryptographyA Keccak-based cryptographic hash function available in SORA Nexus for domains requiring NIST-standardized hashing. While Poseidon2 over Goldilocks is used for internal traces and sparse Merkle trees, SHA-3 provides com…
Sections
Definition
A Keccak-based cryptographic hash function available in SORA Nexus for domains requiring NIST-standardized hashing. While Poseidon2 over Goldilocks is used for internal traces and sparse Merkle trees, SHA-3 provides compatibility with external systems and regulatory requirements that mandate NIST-approved algorithms.
Why it matters
Provides NIST-standardized hashing for regulatory compliance and external interoperability.