The Hash Function BLAKE
This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of BLAKE2, an improved version popular among developers. It describes how BLAKE was designed and why BLAKE2 was developed, and it offers guidelines on impl...
Main Authors: | Aumasson, Jean-Philippe (Author), Meier, Willi (Author), Phan, Raphael C.-W (Author), Henzen, Luca (Author) |
---|---|
Corporate Author: | SpringerLink (Online service) |
Format: | Electronic eBook |
Language: | English |
Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2014.
|
Series: | Information Security and Cryptography,
|
Subjects: | |
Online Access: | Full Text via HEAL-Link |
Similar Items
-
Applications and Techniques in Information Security 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings /
Published: (2016) -
Applications and Techniques in Information Security 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings /
Published: (2015) -
Cryptographic Hardware and Embedded Systems - CHES 2013 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings /
Published: (2013) -
Applications and Techniques in Information Security 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings /
Published: (2017) -
Secure IT Systems 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings /
Published: (2013)