Analysis of BLAKE2
From MaRDI portal
Recommendations
Cited in
(9)- On the resilience of Even-Mansour to invariant permutations
- Analysis of NORX: investigating differential and rotational properties
- BLAKE2: simpler, smaller, fast as MD5
- Weak keys for AEZ, and the external key padding attack
- The boomerang attacks on BLAKE and BLAKE2
- Higher-order differential meet-in-the-middle preimage attacks on SHA-1 and BLAKE
- Collisions for variants of the BLAKE hash function
- Differential and invertibility properties of BLAKE
- An observation on NORX, BLAKE2, and ChaCha
This page was built for publication: Analysis of BLAKE2
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5404764)