Skip to search formSkip to main contentSkip to account menu

BLAKE (hash function)

Known as: BLAKE2, BLAKE2b, Blake (disambiguation) 
BLAKE and BLAKE2 are cryptographic hash functions based on Dan Bernstein's ChaCha stream cipher, but a permuted copy of the input block, XORed with… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
The need for huge storage systems rises with the ever growing creation of data. With growing capacities and shrinking prices… 
2014
2014
In this paper, we study the security margins of hash functions BLAKE and BLAKE2 against the boomerang attack. We launch boomerang… 
2013
2013
Following the attacks considerable standard SHA-2, In this paper, a new version of hash was developed known as SHA-3. We… 
2011
2011
A global competition is currently taking place to select a hash function which will become a new standard in the field of… 
2011
2011
. The polychaete Dipolydora commensalis is an obligate symbiont of hermit crabs and produces a burrow along the columella of the… 
2010
2010
BLAKE, one of SHA-3 candidates, and LAKE hash functions show the characteristic that the block length of the internal state is… 
Review
2010
Review
2010
Hash functions form an important category of cryptography, which is widely used in a great number of protocols and security… 
2000
2000
Ammonium (NH 4 +) concentration profiles in piston-core sediments of the Carolina Rise and Blake Ridge generally have linear…