SHA-3 has an advantage over other algorithms because, there is no need for table look ups, arithmetic operations or data dependent operations.
(a) True
(b) False
This question was posed to me in an international level competition.
The query is from Secure Hash Algorithms (SHA) topic in chapter Other Public Key Cryptosystems and Cryptographic Hash Functions of Cryptograph & Network Security