The Hash Function BLAKE:
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Berlin ; Heidelberg ; New York ; Dordrecht ; London
Springer
[2014]
|
Schriftenreihe: | Information Security and Cryptography
|
Schlagworte: | |
Online-Zugang: | BFB01 BTU01 FHA01 FHM01 FHN01 FKE01 FRO01 UBG01 UBR01 UBT01 UBW01 UER01 UPA01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online Ressource (XVIII, 228 Seiten) Diagramme |
ISBN: | 9783662447574 |
DOI: | 10.1007/978-3-662-44757-4 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043209838 | ||
003 | DE-604 | ||
005 | 20160530 | ||
007 | cr|uuu---uuuuu | ||
008 | 151215s2014 |||| o||u| ||||||eng d | ||
020 | |a 9783662447574 |c Online |9 978-3-662-44757-4 | ||
024 | 7 | |a 10.1007/978-3-662-44757-4 |2 doi | |
035 | |a (OCoLC)899177213 | ||
035 | |a (DE-599)BVBBV043209838 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-522 |a DE-Aug4 |a DE-861 |a DE-M347 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-634 |a DE-739 |a DE-355 | ||
082 | 0 | |a 005.82 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Aumasson, Jean-Philippe |e Verfasser |0 (DE-588)1068930497 |4 aut | |
245 | 1 | 0 | |a The Hash Function BLAKE |c Jean-Philippe Aumasson, Willi Meier, Raphael C.-W. Phan, Luca Henzen |
264 | 1 | |a Berlin ; Heidelberg ; New York ; Dordrecht ; London |b Springer |c [2014] | |
264 | 4 | |c © 2014 | |
300 | |a 1 Online Ressource (XVIII, 228 Seiten) |b Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Information Security and Cryptography | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Algorithms | |
650 | 4 | |a System safety | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Algorithm Analysis and Problem Complexity | |
650 | 4 | |a Security Science and Technology | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a BLAKE |g Hash-Algorithmus |0 (DE-588)1069294888 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a BLAKE |g Hash-Algorithmus |0 (DE-588)1069294888 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Meier, Willi |d 1948- |e Verfasser |0 (DE-588)130556246 |4 aut | |
700 | 1 | |a Phan, Raphael C.-W. |e Verfasser |4 aut | |
700 | 1 | |a Henzen, Luca |d 1982- |e Verfasser |0 (DE-588)143423924 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-662-44756-7 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-662-44757-4 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632999&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632999&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2014 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028632999 | ||
966 | e | |u https://doi.org/10.1007/978-3-662-44757-4 |l BFB01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-44757-4 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-44757-4 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-44757-4 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-44757-4 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-44757-4 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-44757-4 |l FRO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-44757-4 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-44757-4 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-44757-4 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-44757-4 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-44757-4 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-44757-4 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175709387620352 |
---|---|
adam_text | THE HASH FUNCTION BLAKE
/ AUMASSON, JEAN-PHILIPPE
: 2014
TABLE OF CONTENTS / INHALTSVERZEICHNIS
INTRODUCTION
PRELIMINARIES
SPECIFICATION OF BLAKE
USING BLAKE
BLAKE IN SOFTWARE
BLAKE IN HARDWARE
DESIGN RATIONALE
SECURITY OF BLAKE
BLAKE2
CONCLUSION
REFERENCES
APP. A, TEST VECTORS
APP. B, REFERENCE C CODE
APP. C, THIRD-PARTY SOFTWARE
INDEX
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
THE HASH FUNCTION BLAKE
/ AUMASSON, JEAN-PHILIPPE
: 2014
ABSTRACT / INHALTSTEXT
THIS IS A COMPREHENSIVE DESCRIPTION OF THE CRYPTOGRAPHIC HASH FUNCTION
BLAKE, ONE OF THE FIVE FINAL CONTENDERS IN THE NIST SHA3 COMPETITION,
AND OF BLAKE2, AN IMPROVED VERSION POPULAR AMONG DEVELOPERS. IT
DESCRIBES HOW BLAKE WAS DESIGNED AND WHY BLAKE2 WAS DEVELOPED, AND IT
OFFERS GUIDELINES ON IMPLEMENTING AND USING BLAKE, WITH A FOCUS ON
SOFTWARE IMPLEMENTATION. IN THE FIRST TWO CHAPTERS, THE AUTHORS OFFER
A SHORT INTRODUCTION TO CRYPTOGRAPHIC HASHING, THE SHA3 COMPETITION, AND
BLAKE. THEY REVIEW APPLICATIONS OF CRYPTOGRAPHIC HASHING, THEY DESCRIBE
SOME BASIC NOTIONS SUCH AS SECURITY DEFINITIONS AND STATE-OF-THE-ART
COLLISION SEARCH METHODS, AND THEY PRESENT SHA1, SHA2, AND THE SHA3
FINALISTS.IN THE CHAPTERS THAT FOLLOW, THE AUTHORS GIVE A COMPLETE
DESCRIPTION OF THE FOUR INSTANCES BLAKE-256, BLAKE-512, BLAKE-224, AND
BLAKE-384; THEY DESCRIBE APPLICATIONS OF BLAKE, INCLUDING SIMPLE HASHING
WITH OR WITHOUT A SALT, AND HMAC AND PBKDF2 CONSTRUCTIONS; THEY REVIEW
IMPLEMENTATION TECHNIQUES, FROM PORTABLE C AND PYTHON TO AVR ASSEMBLY
AND VECTORIZED CODE USING SIMD CPU INSTRUCTIONS; THEY DESCRIBE BLAKE’S
PROPERTIES WITH RESPECT TO HARDWARE DESIGN FOR IMPLEMENTATION IN ASICS
OR FPGAS; THEY EXPLAIN BLAKE S DESIGN RATIONALE IN DETAIL, FROM NIST’S
REQUIREMENTS TO THE CHOICE OF INTERNAL PARAMETERS; THEY SUMMARIZE THE
KNOWN SECURITY PROPERTIES OF BLAKE AND DESCRIBE THE BEST ATTACKS ON
REDUCED OR MODIFIED VARIANTS; AND THEY PRESENT BLAKE2, THE SUCCESSOR OF
BLAKE, STARTING WITH MOTIVATIONS AND ALSO COVERING ITS PERFORMANCE AND
SECURITY ASPECTS.THE BOOK CONCLUDES WITH DETAILED TEST VECTORS, A
REFERENCE PORTABLE C IMPLEMENTATION OF BLAKE, AND A LIST OF THIRD-PARTY
SOFTWARE IMPLEMENTATIONS OF BLAKE AND BLAKE2. THE BOOK IS ORIENTED
TOWARDS PRACTICE – ENGINEERING AND CRAFTSMANSHIP – RATHER THAN
THEORY. IT IS SUITABLE FOR DEVELOPERS, ENGINEERS, AND SECURITY
PROFESSIONALS ENGAGED WITH BLAKE AND CRYPTOGRAPHIC HASHING IN GENERAL,
AND FOR APPLIED CRYPTOGRAPHY RESEARCHERS AND STUDENTS WHO NEED A
CONSOLIDATED REFERENCE AND A DETAILED DESCRIPTION OF THE DESIGN PROCESS,
OR GUIDELINES ON HOW TO DESIGN A CRYPTOGRAPHIC ALGORITHM
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Aumasson, Jean-Philippe Meier, Willi 1948- Phan, Raphael C.-W Henzen, Luca 1982- |
author_GND | (DE-588)1068930497 (DE-588)130556246 (DE-588)143423924 |
author_facet | Aumasson, Jean-Philippe Meier, Willi 1948- Phan, Raphael C.-W Henzen, Luca 1982- |
author_role | aut aut aut aut |
author_sort | Aumasson, Jean-Philippe |
author_variant | j p a jpa w m wm r c w p rcw rcwp l h lh |
building | Verbundindex |
bvnumber | BV043209838 |
classification_rvk | ST 276 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)899177213 (DE-599)BVBBV043209838 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-662-44757-4 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03888nmm a2200745zc 4500</leader><controlfield tag="001">BV043209838</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160530 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151215s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662447574</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-662-44757-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-662-44757-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)899177213</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043209838</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-522</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Aumasson, Jean-Philippe</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1068930497</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The Hash Function BLAKE</subfield><subfield code="c">Jean-Philippe Aumasson, Willi Meier, Raphael C.-W. Phan, Luca Henzen</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ; Heidelberg ; New York ; Dordrecht ; London</subfield><subfield code="b">Springer</subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online Ressource (XVIII, 228 Seiten)</subfield><subfield code="b">Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Information Security and Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithms</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">System safety</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithm Analysis and Problem Complexity</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security Science and Technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">BLAKE</subfield><subfield code="g">Hash-Algorithmus</subfield><subfield code="0">(DE-588)1069294888</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">BLAKE</subfield><subfield code="g">Hash-Algorithmus</subfield><subfield code="0">(DE-588)1069294888</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Meier, Willi</subfield><subfield code="d">1948-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)130556246</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Phan, Raphael C.-W.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Henzen, Luca</subfield><subfield code="d">1982-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)143423924</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-662-44756-7</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-662-44757-4</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632999&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632999&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2014</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028632999</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-44757-4</subfield><subfield code="l">BFB01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-44757-4</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-44757-4</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-44757-4</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-44757-4</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-44757-4</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-44757-4</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-44757-4</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-44757-4</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-44757-4</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-44757-4</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-44757-4</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-44757-4</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043209838 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:20:36Z |
institution | BVB |
isbn | 9783662447574 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028632999 |
oclc_num | 899177213 |
open_access_boolean | |
owner | DE-522 DE-Aug4 DE-861 DE-M347 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-739 DE-355 DE-BY-UBR |
owner_facet | DE-522 DE-Aug4 DE-861 DE-M347 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-739 DE-355 DE-BY-UBR |
physical | 1 Online Ressource (XVIII, 228 Seiten) Diagramme |
psigel | ZDB-2-SCS ZDB-2-SCS_2014 |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Springer |
record_format | marc |
series2 | Information Security and Cryptography |
spelling | Aumasson, Jean-Philippe Verfasser (DE-588)1068930497 aut The Hash Function BLAKE Jean-Philippe Aumasson, Willi Meier, Raphael C.-W. Phan, Luca Henzen Berlin ; Heidelberg ; New York ; Dordrecht ; London Springer [2014] © 2014 1 Online Ressource (XVIII, 228 Seiten) Diagramme txt rdacontent c rdamedia cr rdacarrier Information Security and Cryptography Computer science Computer security Data encryption (Computer science) Algorithms System safety Computer Science Data Encryption Systems and Data Security Algorithm Analysis and Problem Complexity Security Science and Technology Informatik BLAKE Hash-Algorithmus (DE-588)1069294888 gnd rswk-swf BLAKE Hash-Algorithmus (DE-588)1069294888 s DE-604 Meier, Willi 1948- Verfasser (DE-588)130556246 aut Phan, Raphael C.-W. Verfasser aut Henzen, Luca 1982- Verfasser (DE-588)143423924 aut Erscheint auch als Druckausgabe 978-3-662-44756-7 https://doi.org/10.1007/978-3-662-44757-4 Verlag URL des Erstveröffentlichers Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632999&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632999&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Aumasson, Jean-Philippe Meier, Willi 1948- Phan, Raphael C.-W Henzen, Luca 1982- The Hash Function BLAKE Computer science Computer security Data encryption (Computer science) Algorithms System safety Computer Science Data Encryption Systems and Data Security Algorithm Analysis and Problem Complexity Security Science and Technology Informatik BLAKE Hash-Algorithmus (DE-588)1069294888 gnd |
subject_GND | (DE-588)1069294888 |
title | The Hash Function BLAKE |
title_auth | The Hash Function BLAKE |
title_exact_search | The Hash Function BLAKE |
title_full | The Hash Function BLAKE Jean-Philippe Aumasson, Willi Meier, Raphael C.-W. Phan, Luca Henzen |
title_fullStr | The Hash Function BLAKE Jean-Philippe Aumasson, Willi Meier, Raphael C.-W. Phan, Luca Henzen |
title_full_unstemmed | The Hash Function BLAKE Jean-Philippe Aumasson, Willi Meier, Raphael C.-W. Phan, Luca Henzen |
title_short | The Hash Function BLAKE |
title_sort | the hash function blake |
topic | Computer science Computer security Data encryption (Computer science) Algorithms System safety Computer Science Data Encryption Systems and Data Security Algorithm Analysis and Problem Complexity Security Science and Technology Informatik BLAKE Hash-Algorithmus (DE-588)1069294888 gnd |
topic_facet | Computer science Computer security Data encryption (Computer science) Algorithms System safety Computer Science Data Encryption Systems and Data Security Algorithm Analysis and Problem Complexity Security Science and Technology Informatik BLAKE Hash-Algorithmus |
url | https://doi.org/10.1007/978-3-662-44757-4 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632999&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632999&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT aumassonjeanphilippe thehashfunctionblake AT meierwilli thehashfunctionblake AT phanraphaelcw thehashfunctionblake AT henzenluca thehashfunctionblake |