Provided by Li Zhu:
First table in Appendix A refers to hash algorithms also as MAC algorithms. This should be removed.
FROM: Hash (aka message authentication code (MAC)) algorithms:
TO: Hash algorithms:
Reason: MAC (more precisely, HMAC) is built upon hash primitives, but they are not equivalent. Typical HMAC will call hash functions twice. By the way, there are MACs built upon symmetric block ciphers instead of hash functions.