Priority: Low
In 2016, NIST published SP.800-185 describing additional SHA-3 derived functions:
cSHAKExxx(X,L,N,S): "A version of SHAKE supporting explicit domain separation via customization parameters."
KMACxxx/KMACXOFxxx(K,X,L,S): "A keyed hash function based on Keccak. Can also be used without a key as a regular hash function."
TupleHashxxx/TupleHashXOFxxx(X,L,S): "A function for hashing tuples of strings. The output of this function depends on both the contents and the sequence of input strings."
ParallelHashxxx/ParallelHashXOFxxx(X,B,L,S): "A function designed to exploit parallelism in modern processors for faster hashing. Unlike KangarooTwelve, does not use reduced-round Keccak."
The regular functions are fine anyway.
Priority: Low
In 2016, NIST published SP.800-185 describing additional SHA-3 derived functions:
cSHAKExxx(X,L,N,S): "A version of SHAKE supporting explicit domain separation via customization parameters."KMACxxx/KMACXOFxxx(K,X,L,S): "A keyed hash function based on Keccak. Can also be used without a key as a regular hash function."TupleHashxxx/TupleHashXOFxxx(X,L,S): "A function for hashing tuples of strings. The output of this function depends on both the contents and the sequence of input strings."ParallelHashxxx/ParallelHashXOFxxx(X,B,L,S): "A function designed to exploit parallelism in modern processors for faster hashing. Unlike KangarooTwelve, does not use reduced-round Keccak."The regular functions are fine anyway.