Using BLAKE

Jean Philippe Aumasson, Willi Meier, Raphael C.W. Phan, Luca Henzen

Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Researchpeer-review

1 Citation (Scopus)

Abstract

This chapter shows how BLAKE can be used in common hash-based cryptographic schemes. For each scheme, we provide a basic description and a concrete example showing how the data to be hashed is formed, as well as some intermediate values and the final result. Examples can be seen as detailed test vectors, and aim to be reproducible so that developers can check their implementations against various use cases. This chapter may be used as a set of test vectors, but does not aim to be an authoritative specification, let alone a recommendation, of the standard schemes considered.

Original languageEnglish
Title of host publicationInformation Security and Cryptography
PublisherSpringer
Pages45-54
Number of pages10
DOIs
Publication statusPublished - 2014
Externally publishedYes

Publication series

NameInformation Security and Cryptography
Volume24
ISSN (Print)1619-7100
ISSN (Electronic)2197-845X

Cite this