The hash function \texttt{BLAKE}
From MaRDI portal
Publication:483134
DOI10.1007/978-3-662-44757-4zbMath1371.94002OpenAlexW2408040052MaRDI QIDQ483134
Luca Henzen, Raphael C.-W. Phan, Willi Meier, Jean-Philippe Aumasson
Publication date: 15 December 2014
Published in: Information Security and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-44757-4
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Research exposition (monographs, survey articles) pertaining to information and communication theory (94-02)
Related Items
Stochastic fault and cyber-attack detection and consensus control in multi-agent systems, Optimal security for keyed hash functions: avoiding time-space tradeoffs for finding collisions, On scatter properties of modular addition operation over imprimitivity systems of the translation group of the binary vector space, Quantum search for scaled hash function preimages, Unnamed Item, Differential Power Analysis of XMSS and SPHINCS, BLAKE, Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
Uses Software