SHA-3 allows variable length input and output.
(a) True
(b) False
The question was asked by my college director while I was bunking the class.
I'd like to ask this question from Secure Hash Algorithms (SHA) topic in division Other Public Key Cryptosystems and Cryptographic Hash Functions of Cryptograph & Network Security