The Hash Function BLAKE

The Hash Function BLAKE

Paperback(Softcover reprint of the original 1st ed. 2014)

View All Available Formats & Editions
Choose Expedited Shipping at checkout for guaranteed delivery by Thursday, February 28

Product Details

ISBN-13: 9783662525975
Publisher: Springer Berlin Heidelberg
Publication date: 11/11/2016
Series: Information Security and Cryptography
Edition description: Softcover reprint of the original 1st ed. 2014
Pages: 228
Product dimensions: 6.10(w) x 9.25(h) x 0.02(d)

About the Author

Dr. Jean-Philippe Aumasson received his Ph.D. from EPFL (Lausanne) in 2009. He is principal cryptographer at Kudelski Security, part of the Kudelski group, in Switzerland. He has co-authored more than 30 research papers in the field of symmetric cryptography and cryptanalysis and regularly talks at security and hacking conferences.

Prof.-Dr. Willi Meier received his Ph.D. in Mathematics from ETH Zürich in 1975. He has been a professor of mathematics and computer science at the University of Applied Sciences, Northwestern Switzerland in Windisch since 1985. His current research interests include the analysis and design of cryptographic primitives such as stream ciphers and hash functions.

Prof.Raphael Phanreceived his Ph.D. from the Multimedia University (MMU) in 2005.He held academic positions at UK, Swiss and Australian universities before becoming professor of security engineering at MMU in 2012. He has served in the technical program committees of over 100 security conferences.His research interests include security, privacy and cryptology and more recently dark side cryptography and subtleness recognition.

Dr. Luca Henzen received his Ph.D. from ETH Zürich in 2007. He works for UBS AG, Switzerland. His research interests include the design of VLSI circuits for cryptographic applications and low-power systems.

Table of Contents

Introduction.- Preliminaries.- Specification of BLAKE.- Using BLAKE.- BLAKE in Software.- BLAKE in Hardware.- Design Rationale.- Security of BLAKE.- BLAKE2.- Conclusion.- References.- App. A, Test Vectors.- App. B, Reference C Code.- App. C, Third-Party Software.- Index.

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews