How many rounds are present in each iteration function of SHA-3?
(a) 3
(b) 4
(c) 5
(d) 6
This question was posed to me in an international level competition.
My question is from Secure Hash Algorithms (SHA) topic in portion Other Public Key Cryptosystems and Cryptographic Hash Functions of Cryptograph & Network Security