Inicio > > Seguridad informática > The Hash Function BLAKE
The Hash Function BLAKE

The Hash Function BLAKE

Jean-Philippe Aumasson / Raphael C.-W. Phan / Willi Meier

134,91 €
IVA incluido
Disponible
Editorial:
Springer Nature B.V.
Año de edición:
2016
Materia
Seguridad informática
ISBN:
9783662525975
134,91 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of BLAKE2, an improved version popular among developers. It describes how BLAKE was designed and why BLAKE2 was developed, and it offers guidelines on implementing and using BLAKE, with a focus on software implementation.In the first two chapters, the authors offer a short introduction to cryptographic hashing, the SHA3 competition and BLAKE. They review applications of cryptographic hashing, they describe some basic notions such as security definitions and state-of-the-art collision search methods and they present SHA1, SHA2 and the SHA3 finalists. In the chapters that follow, the authors give a complete description of the four instances BLAKE-256, BLAKE-512, BLAKE-224 and BLAKE-384; they describe applications of BLAKE, including simple hashing with or without a salt and HMAC and PBKDF2 constructions; they review implementation techniques, from portable C and Python to AVR assembly and vectorized code using SIMD CPU instructions; they describe BLAKE’s properties with respect to hardware design for implementation in ASICs or FPGAs; they explain BLAKE’s design rationale in detail, from NIST’s requirements to the choice of internal parameters; they summarize the known security properties of BLAKE and describe the best attacks on reduced or modified variants; and they present BLAKE2, the successor of BLAKE, starting with motivations and also covering its performance and security aspects. The book concludes with detailed test vectors, a reference portable C implementation of BLAKE, and a list of third-party software implementations of BLAKE and BLAKE2.The book is oriented towards practice - engineering and craftsmanship - rather than theory. It is suitable for developers, engineers and security professionals engaged with BLAKE and cryptographic hashing in general and for applied cryptography researchers and students who need a consolidated reference and a detailed description of the design process, or guidelines on how to design a cryptographic algorithm.

Artículos relacionados

  • Innovations in Data Methodologies and Computational Algorithms for Medical Applications
    Aryya Gangopadhyay
    Medicine has, until recently, been slow to adapt to information technologies and systems for many reasons, but the future lies therein. Innovations in Data Methodologies and Computational Algorithms for Medical Applications offers the most cutting-edge research in the field, offering insights into case studies and methodologies from around the world. The text details the latest...
  • Nine Algorithms That Changed the Future
    John MacCormick
    Nine revolutionary algorithms that power our computers and smartphonesEvery day, we use our computers to perform remarkable feats. A simple web search picks out a handful of relevant needles from the world’s biggest haystack. Uploading a photo to Facebook transmits millions of pieces of information over numerous error-prone network links, yet somehow a perfect copy of the photo...
    Disponible

    26,71 €

  • Machine Learning with Rust
    Keiko Nakamura
    In this stimulating journey of Rust, you’ll learn how to use the Rust programming language in conjunction with machine learning. It’s not a full guide to learning machine learning with Rust. Instead, it’s more of a journey that shows you what’s possible when you use Rust to solve machine learning problems. Some people like Rust because it is quick and safe. This book shows how ...
    Disponible

    69,58 €

  • Design and Analysis of Algorithms
    Dr. Paras Jain
    In the ever-evolving landscape of computer science, the significance of algorithm design and analysis cannot be overstated. This book, 'Design and Analysis of Algorithms,' endeavors to be a comprehensive guide that navigates both the theoretical foundations and practical applications of algorithms. As we delve into the intricate realm of algorithmic problem-solving, this text a...
    Disponible

    51,79 €

  • Deep Learning and Applications
    In recent years, the field of artificial intelligence has witnessed an extraordinary resurgence, with deep learning emerging as the cornerstone of numerous breakthroughs across various domains. 'Deep Learning and Applications' embarks on a journey into the captivating realm of deep learning, unraveling its intricate concepts, techniques, and transformative potential.This book s...
    Disponible

    43,49 €

  • Mastering Vim - Second Edition
    Ruslan Osipov
    Build applications with advanced movement, text operations, and IDE capabilities in Vim 9.0 and NeovimKey Features:- Develop proficiency in Vim and Vimscript for efficient text editing- Integrate Vim into your daily development workflow and customize it to suit your preferences- Learn through examples in Python code, explore scenarios with version control, and focus on the buil...
    Disponible

    60,86 €