BLAKE3-team

35 posts

BLAKE3-team banner
BLAKE3-team

BLAKE3-team

@Blake3Team

The BLAKE3 cryptographic hash function By @oconnor663 @sevenps @veorq @zooko

Joined Ocak 2020
0 Following489 Followers
BLAKE3-team
BLAKE3-team@Blake3Team·
The `blake3` Rust crate just added a `hazmat` module: docs.rs/blake3/latest/…. The goal is to support advanced use cases like Iroh and Bao without requiring undocumented APIs or forking the crate. If you like library docs with scary warnings at the top, take a look.
English
0
2
7
1.2K
BLAKE3-team retweeted
Saito Network 🟥
Saito Network 🟥@SaitoOfficial·
P2P Chat with Blake3 Hash Author @oconnor663 Wonderful guest and fascinating conversation behind the tech that links blocks in Saito together, and more... Learn about the tech that makes Saito tick from an industry expert and a gracious teacher - Thanks Jack!
English
3
18
46
4.5K
BLAKE3-team
BLAKE3-team@Blake3Team·
Version 1.5.4 includes new assembly optimizations from @sevenps for long outputs, bringing them into line with existing performance for long inputs. github.com/BLAKE3-team/BL…. If you have an AVX-512-supporting Linux machine, give these a try: cargo +nightly bench xof
BLAKE3-team tweet media
English
0
3
13
1.9K
BLAKE3-team retweeted
Anjan Roy
Anjan Roy@meanjanroy·
My latest project implements BLAKE3 cryptographic hash function using SYCL 1GB input hashed on Nvidia Tesla V100: ~12ms Intel Iris Xe Max GPU: ~38ms Intel Xeon Platinum 2.6Ghz 128 CPUs: ~24ms Single source targeting CPU, GPU 😉 See github.com/itzmeanjan/bla… #sycl @Blake3Team
English
0
7
23
0
BLAKE3-team
BLAKE3-team@Blake3Team·
@awakecoding That makes sense. HKDF-SHA256 is a perfectly reasonable choice for most applications.
English
0
0
1
0
Marc-André Moreau
Marc-André Moreau@awakecoding·
@Blake3Team I ended up just using HKDF + SHA256, mostly because performance was already more than excellent in Rust, and I wasn't sure about how to correctly use BLAKE3 as a replacement if I really wanted to push it one step further.
English
1
0
0
0
Marc-André Moreau
Marc-André Moreau@awakecoding·
@SoatokDhole I've got a draft design using HKDF with SHA256, but BLAKE3's performance is very tempting. However, HKDF uses HMAC, and BLAKE3 appears to have its own keyed hash and key derivation functions. Is it better to replace HKDF with BLAKE3 entirely? 🤔
English
1
0
0
0
BLAKE3-team
BLAKE3-team@Blake3Team·
@awakecoding The goal of the derive_key() approach is to make domain separation as reliable as possible between uncoordinated callers who are sharing key material. Obviously "not sharing key material" is the safest option when you have a choice, but we live in a messy world.
English
0
0
0
0
BLAKE3-team
BLAKE3-team@Blake3Team·
@awakecoding Another difference between derive_key() and HKDF is that derive_key() is stricter about how its inputs should be used. The first argument must always be a hardcoded context/purpose string, and the second input is everything else. HKDF has three arguments, all somewhat freeform.
English
2
0
0
0
BLAKE3-team
BLAKE3-team@Blake3Team·
Ice Lake benchmarks: #amd64-icelake" target="_blank" rel="nofollow noopener">bench.cr.yp.to/results-hash.h…
English
0
2
2
0
BLAKE3-team
BLAKE3-team@Blake3Team·
The first SUPERCOP benchmark for BLAKE3 on AVX-512 is in: #amd64-ygritte" target="_blank" rel="nofollow noopener">bench.cr.yp.to/results-hash.h…
English
0
0
5
0