Introduction

Jean Philippe Aumasson, Willi Meier, Raphael C.W. Phan, Luca Henzen

Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Otherpeer-review

1 Citation (Scopus)

Abstract

This introductory chapter presents cryptographic hash functions and their most common applications. It then describes the context of this book, namely NIST’s SHA3 competition, and presents a short review of BLAKE’s performance and unique properties.

Original languageEnglish
Title of host publicationInformation Security and Cryptography
PublisherSpringer
Pages1-7
Number of pages7
DOIs
Publication statusPublished - 2014
Externally publishedYes

Publication series

NameInformation Security and Cryptography
Volume24
ISSN (Print)1619-7100
ISSN (Electronic)2197-845X

Cite this