BLAKE3-specs VS go-benchmarks

Compare BLAKE3-specs vs go-benchmarks and see what are their differences.

BLAKE3-specs

The BLAKE3 paper: specifications, analysis, and design rationale (by BLAKE3-team)

go-benchmarks

Comprehensive and reproducible benchmarks for Go developers and architects. (by skerkour)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
BLAKE3-specs go-benchmarks
8 1
158 9
0.0% -
0.0 1.9
almost 2 years ago 2 months ago
HTML Go
GNU General Public License v3.0 or later -
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

BLAKE3-specs

Posts with mentions or reviews of BLAKE3-specs. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-11-13.
  • Reasons to Prefer Blake3 over Sha256
    7 projects | news.ycombinator.com | 13 Nov 2023
    We put a lot of effort into section 5.1.2 of https://github.com/BLAKE3-team/BLAKE3-specs/blob/master/blak..., and the relatively more complicated part of BLAKE3 (incrementally building the Merkle tree) ends up being ~4 lines of code. Let me know what you think.
  • Why do we even need HKDF's?
    1 project | /r/crypto | 24 Aug 2022
    BLAKE3 is a new function which includes a KDF mode, and is significantly faster than HKDF-SHA256. However, it hasn't seen as much cryptanalysis as more established functions, so I'm still somewhat wary of it (admittedly it's a reduced-round variant of BLAKE2s, with extra modes, so I'm not that wary, but it's still worth a warning).
  • A few questions...
    2 projects | /r/crypto | 24 Aug 2022
    The BLAKE3 spec is also pretty readable (though I think the graphics in the BLAKE2b paper make it a bit easier to understand).
  • Linux Kernel RNG is now Blake2 instead of SHA1 and 3x faster
    6 projects | news.ycombinator.com | 30 Dec 2021
    > That's for 16KiB inputs.

    BLAKE3 needs 16 KiB of input to hit the numbers in that bar chart, but BLAKE2s doesn't. It'll maintain its advantage over SHA-256 all the way down to the empty string. You can see this in Figure 3 of https://github.com/BLAKE3-team/BLAKE3-specs/blob/master/blak.... (BLAKE3 is also faster than SHA-256 all the way down to the empty string, but not by as large a margin as the 16 KiB figures suggest.)

    On the other hand, these measurements were done on machines without SHA-256 hardware acceleration. If you have that (and Intel chips from the past year do), then SHA-256 does a lot better of course.

  • I Have Settled on XChaCha20+Blake3 for AEAD
    2 projects | news.ycombinator.com | 29 Nov 2021
    Its section 2.1 of the paper: https://github.com/BLAKE3-team/BLAKE3-specs/blob/master/blak...

    Though, note, blake3 still provides enhanced resistance against the attacks against blake2 even in the case where you only have one block, due to the change in how the fundamental hashing primitive is used.

  • Consensus mechanism
    2 projects | /r/tangram | 28 Jun 2021
    Consensus is done with Blockmania, a PBFT consensus protocol. Link P2P networking stack (in progress) = libp2p. Link (currently we're using Serf for cluster membership, but this will be replaced by libp2p) We use Blake 3 for merkle tree and hashing algorithm. Link (amongst others that are standard, e.g. multisig) Lthash is used for block propagation and homomorphic hashing, and to extend for bootstrapping. Link For transaction and balance privacy we use:

go-benchmarks

Posts with mentions or reviews of go-benchmarks. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-11-13.
  • Reasons to Prefer Blake3 over Sha256
    7 projects | news.ycombinator.com | 13 Nov 2023
    At the end of the day, what matters really for most people is

    1) Certifications (FIPS...)

    2) Speed.

    SHA-256 is fast enough for maybe 99,9% of use cases as you will saturate your I/O way before SHA-256 becomes your bottleneck[0][1]. Also, from my experience with the different available implementations, SHA-256 is up to 1.8 times faster than Blake3 on arm64.

    [0] https://github.com/skerkour/go-benchmarks/blob/main/results/...

    [1] https://kerkour.com/fast-hashing-algorithms

What are some alternatives?

When comparing BLAKE3-specs and go-benchmarks you can also consider the following projects:

BLAKE3 - the official Rust and C implementations of the BLAKE3 cryptographic hash function

xsum - Checksums with Merkle trees and concurrency

XKCP - eXtended Keccak Code Package

experimental-caead - Experimental committing AEAD designed by Soatok.

multihash - Self describing hashes - for future proofing

Hakobu

bao - an implementation of BLAKE3 verified streaming

deepmark - Deepmark AI enables a unique testing environment for language models (LLM) assessment on task-specific metrics and on your own data so your GenAI-powered solution has predictable and reliable performance.

rust-libp2p - The Rust Implementation of the libp2p networking stack.

fpmoney - 🧧 Fixed-Point Decimal Money