Skip to search formSkip to main contentSkip to account menu

BLAKE (hash function)

Known as: BLAKE2, BLAKE2b, Blake (disambiguation) 
BLAKE and BLAKE2 are cryptographic hash functions based on Dan Bernstein's ChaCha stream cipher, but a permuted copy of the input block, XORed with… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
The need for huge storage systems rises with the ever growing creation of data. With growing capacities and shrinking prices… 
2014
2014
___________________________________ Abstract - In Cloud computing data security is biggest problem. Cloud computing is a model… 
2013
2013
Following the attacks considerable standard SHA-2, In this paper, a new version of hash was developed known as SHA-3. We… 
2012
2012
In 2013 Intel will release the AVX2 instructions, which introduce 256-bit singleinstruction multiple-data (SIMD) integer… 
2011
2011
A global competition is currently taking place to select a hash function which will become a new standard in the field of… 
2011
2011
The NIST SHA-3 competition aims to select a new secure hash standard. Hardware implementation quality is an important factor in… 
Review
2010
Review
2010
Hash functions form an important category of cryptography, which is widely used in a great number of protocols and security… 
2010
2010
BLAKE, one of SHA-3 candidates, and LAKE hash functions show the characteristic that the block length of the internal state is… 
2000
2000
Ammonium (NH 4 +) concentration profiles in piston-core sediments of the Carolina Rise and Blake Ridge generally have linear…