Analysis of BLAKE2
From MaRDI portal
Publication:5404764
DOI10.1007/978-3-319-04852-9_21zbMATH Open1337.94038OpenAlexW2149460601MaRDI QIDQ5404764FDOQ5404764
Authors: Jian Guo, Pierre Karpman, Ivica Nikolić, Lei Wang, Shuang Wu
Publication date: 28 March 2014
Published in: Topics in Cryptology – CT-RSA 2014 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-04852-9_21
Recommendations
hash functiondifferential cryptanalysisiterative differentialrotational cryptanalysisBLAKEimpossible differential cryptanalysisinternal differentialBLAKE2
Cited In (9)
- On the resilience of Even-Mansour to invariant permutations
- Analysis of NORX: investigating differential and rotational properties
- BLAKE2: simpler, smaller, fast as MD5
- Weak keys for AEZ, and the external key padding attack
- The boomerang attacks on BLAKE and BLAKE2
- Higher-order differential meet-in-the-middle preimage attacks on SHA-1 and BLAKE
- Collisions for variants of the BLAKE hash function
- Differential and invertibility properties of BLAKE
- An observation on NORX, BLAKE2, and ChaCha
This page was built for publication: Analysis of BLAKE2
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5404764)