TY - CHAP
T1 - Using BLAKE
AU - Aumasson, Jean Philippe
AU - Meier, Willi
AU - Phan, Raphael C.W.
AU - Henzen, Luca
N1 - Publisher Copyright:
© 2014, Springer-Verlag Berlin Heidelberg.
Copyright:
Copyright 2021 Elsevier B.V., All rights reserved.
PY - 2014
Y1 - 2014
N2 - This chapter shows how BLAKE can be used in common hash-based cryptographic schemes. For each scheme, we provide a basic description and a concrete example showing how the data to be hashed is formed, as well as some intermediate values and the final result. Examples can be seen as detailed test vectors, and aim to be reproducible so that developers can check their implementations against various use cases. This chapter may be used as a set of test vectors, but does not aim to be an authoritative specification, let alone a recommendation, of the standard schemes considered.
AB - This chapter shows how BLAKE can be used in common hash-based cryptographic schemes. For each scheme, we provide a basic description and a concrete example showing how the data to be hashed is formed, as well as some intermediate values and the final result. Examples can be seen as detailed test vectors, and aim to be reproducible so that developers can check their implementations against various use cases. This chapter may be used as a set of test vectors, but does not aim to be an authoritative specification, let alone a recommendation, of the standard schemes considered.
UR - http://www.scopus.com/inward/record.url?scp=85019743252&partnerID=8YFLogxK
U2 - 10.1007/978-3-662-44757-4_4
DO - 10.1007/978-3-662-44757-4_4
M3 - Chapter (Book)
AN - SCOPUS:85019743252
T3 - Information Security and Cryptography
SP - 45
EP - 54
BT - Information Security and Cryptography
PB - Springer
ER -