swMATH11099MaRDI QIDQ23049FDOQ23049
Author name not available (Why is that?)
Official website: http://link.springer.com/book/10.1007%2F978-3-662-44757-4
Cited In (15)
- Quantum search for scaled hash function preimages
- Aurora: transparent succinct arguments for R1CS
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
- Salsa20
- ChaCha
- Security analysis of randomize-hash-then-sign digital signatures
- ARXtools
- Skein Hash
- Tiger
- Collisions for variants of the BLAKE hash function
- Stochastic fault and cyber-attack detection and consensus control in multi-agent systems
- Differential and invertibility properties of BLAKE
- Differential power analysis of XMSS and SPHINCS
- An observation on NORX, BLAKE2, and ChaCha
- Boomerang attacks on BLAKE-32
This page was built for software: BLAKE