<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Sat, 25 Apr 2026 10:58:36 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Cryptography FM - Episodes Tagged with “Hash Functions”</title>
    <link>https://cryptography.fireside.fm/tags/hash%20functions</link>
    <pubDate>Tue, 13 Oct 2020 16:00:00 +0200</pubDate>
    <description>Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>In-depth, substantive discussions on the latest news and research in applied cryptography.</itunes:subtitle>
    <itunes:author>Symbolic Software</itunes:author>
    <itunes:summary>Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/a/ab43586a-0143-48c8-af78-ac9dc4316514/cover.jpg?v=2"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cryptography</itunes:keywords>
    <itunes:owner>
      <itunes:name>Symbolic Software</itunes:name>
      <itunes:email>nadim@symbolic.software</itunes:email>
    </itunes:owner>
<itunes:category text="Science">
  <itunes:category text="Mathematics"/>
</itunes:category>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>Episode 3: BLAKE3, A Parallelizable Hash Function Using Merkle Trees!</title>
  <link>https://cryptography.fireside.fm/3</link>
  <guid isPermaLink="false">5cfe405b-94d1-401a-adf5-98850a709a99</guid>
  <pubDate>Tue, 13 Oct 2020 16:00:00 +0200</pubDate>
  <author>Symbolic Software</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/ab43586a-0143-48c8-af78-ac9dc4316514/5cfe405b-94d1-401a-adf5-98850a709a99.mp3" length="65673787" type="audio/mpeg"/>
  <itunes:episode>3</itunes:episode>
  <itunes:title>Episode 3: BLAKE3, A Parallelizable Hash Function Using Merkle Trees!</itunes:title>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Symbolic Software</itunes:author>
  <itunes:subtitle>Jack O'Connor and Jean-Philippe Aumasson discuss how Merkle Trees make the new BLAKE3 hash function special, and talk about the design process for the BLAKE family of hash functions in general.</itunes:subtitle>
  <itunes:duration>45:36</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/a/ab43586a-0143-48c8-af78-ac9dc4316514/cover.jpg?v=2"/>
  <description>Ever since its introduction in 2012, the BLAKE hash function has been reputed for achieving performance matching and even exceeding MD5 while still maintaining a high security margin.
While the original BLAKE did make it as a finalist to the NIST SHA3 competition, Keccak was ultimately selected. But this hasn’t discouraged the BLAKE team, who in January of this year, published BLAKE3, promising to be even faster than BLAKE2 thanks to a highly parallelizable design and fewer rounds.
But wait, what exactly is a parallelizable hash function? Isn't a lower round number risky? And heck, how do you even design a hash function?! Joining me today are two of the four BLAKE3 authors: Jack O’Connor and Jean-Philippe Aumasson, to discuss these questions and more.
Links and papers discussed in the show:
* BLAKE3 (https://github.com/BLAKE3-team/BLAKE3-specs/blob/master/blake3.pdf)
* Too Much Crypto (https://eprint.iacr.org/2019/1492)
* PoSH: Proof of Staked Hardware Consensus (https://eprint.iacr.org/2020/1176)
* Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance (https://web.cs.ucdavis.edu/~rogaway/papers/oae.pdf)
Music composed by Toby Fox and performed by Sean Schafianski (https://seanschafianski.bandcamp.com/). Special Guests: Jack O'Connor and Jean-Philippe Aumasson.
</description>
  <itunes:keywords>blake3,hash functions</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Ever since its introduction in 2012, the BLAKE hash function has been reputed for achieving performance matching and even exceeding MD5 while still maintaining a high security margin.</p>

<p>While the original BLAKE did make it as a finalist to the NIST SHA3 competition, Keccak was ultimately selected. But this hasn’t discouraged the BLAKE team, who in January of this year, published BLAKE3, promising to be even faster than BLAKE2 thanks to a highly parallelizable design and fewer rounds.</p>

<p>But wait, what exactly is a parallelizable hash function? Isn&#39;t a lower round number risky? And heck, how do you even design a hash function?! Joining me today are two of the four BLAKE3 authors: Jack O’Connor and Jean-Philippe Aumasson, to discuss these questions and more.</p>

<p>Links and papers discussed in the show:</p>

<ul>
<li><a href="https://github.com/BLAKE3-team/BLAKE3-specs/blob/master/blake3.pdf" rel="nofollow">BLAKE3</a></li>
<li><a href="https://eprint.iacr.org/2019/1492" rel="nofollow">Too Much Crypto</a></li>
<li><a href="https://eprint.iacr.org/2020/1176" rel="nofollow">PoSH: Proof of Staked Hardware Consensus</a></li>
<li><a href="https://web.cs.ucdavis.edu/%7Erogaway/papers/oae.pdf" rel="nofollow">Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance</a></li>
</ul>

<p>Music composed by Toby Fox and performed by <a href="https://seanschafianski.bandcamp.com/" rel="nofollow">Sean Schafianski</a>.</p><p>Special Guests: Jack O&#39;Connor and Jean-Philippe Aumasson.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://nsucrypto.nsu.ru/">NSU</a>: <a rel="nofollow" href="https://nsucrypto.nsu.ru/">This episode of Cryptography FM is sponsored by NSUCRYPTO, the International Olympiad in Cryptography. NSUCrypto is the unique cryptographic Olympiad containing scientific mathematical problems for professionals, school and university students from any country. Its aim is to involve young researchers in solving curious and tough scientific problems of modern cryptography. From the very beginning, the concept of the Olympiad was not to focus on solving olympic tasks but on including unsolved research problems at the intersection of mathematics and cryptography. There were more than 1900 participants from 52 countries in the first six Olympiads!

The first round of the 2020 NSUCRYPTO Olympiad will be held this week on October 18th, so head over to the NSUCrypto website at https://nsucrypto.nsu.ru today to sign up and try your hand against interesting and fun cryptography puzzles!</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Ever since its introduction in 2012, the BLAKE hash function has been reputed for achieving performance matching and even exceeding MD5 while still maintaining a high security margin.</p>

<p>While the original BLAKE did make it as a finalist to the NIST SHA3 competition, Keccak was ultimately selected. But this hasn’t discouraged the BLAKE team, who in January of this year, published BLAKE3, promising to be even faster than BLAKE2 thanks to a highly parallelizable design and fewer rounds.</p>

<p>But wait, what exactly is a parallelizable hash function? Isn&#39;t a lower round number risky? And heck, how do you even design a hash function?! Joining me today are two of the four BLAKE3 authors: Jack O’Connor and Jean-Philippe Aumasson, to discuss these questions and more.</p>

<p>Links and papers discussed in the show:</p>

<ul>
<li><a href="https://github.com/BLAKE3-team/BLAKE3-specs/blob/master/blake3.pdf" rel="nofollow">BLAKE3</a></li>
<li><a href="https://eprint.iacr.org/2019/1492" rel="nofollow">Too Much Crypto</a></li>
<li><a href="https://eprint.iacr.org/2020/1176" rel="nofollow">PoSH: Proof of Staked Hardware Consensus</a></li>
<li><a href="https://web.cs.ucdavis.edu/%7Erogaway/papers/oae.pdf" rel="nofollow">Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance</a></li>
</ul>

<p>Music composed by Toby Fox and performed by <a href="https://seanschafianski.bandcamp.com/" rel="nofollow">Sean Schafianski</a>.</p><p>Special Guests: Jack O&#39;Connor and Jean-Philippe Aumasson.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://nsucrypto.nsu.ru/">NSU</a>: <a rel="nofollow" href="https://nsucrypto.nsu.ru/">This episode of Cryptography FM is sponsored by NSUCRYPTO, the International Olympiad in Cryptography. NSUCrypto is the unique cryptographic Olympiad containing scientific mathematical problems for professionals, school and university students from any country. Its aim is to involve young researchers in solving curious and tough scientific problems of modern cryptography. From the very beginning, the concept of the Olympiad was not to focus on solving olympic tasks but on including unsolved research problems at the intersection of mathematics and cryptography. There were more than 1900 participants from 52 countries in the first six Olympiads!

The first round of the 2020 NSUCRYPTO Olympiad will be held this week on October 18th, so head over to the NSUCrypto website at https://nsucrypto.nsu.ru today to sign up and try your hand against interesting and fun cryptography puzzles!</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
