Information technology. Security techniques. Hash-functions. Dedicated hash-functions Part 3, (15th December 1998)