JAR: JAM Axiomatic Reference

5.1. Hash Functions🔗

🔗opaque
Jar.Crypto.blake2b (m : ByteArray) : Hash
Jar.Crypto.blake2b (m : ByteArray) : Hash

ℋ(m) : Blake2b 256-bit hash. GP §3.8.1. blake2b : 𝔹 → ℍ. RFC 7693. Deliberately left abstract — intended to be axiomatically specified or linked via FFI to a concrete cryptographic implementation.

🔗opaque
Jar.Crypto.keccak256 (m : ByteArray) : Hash
Jar.Crypto.keccak256 (m : ByteArray) : Hash

ℋ_K(m) : Keccak 256-bit hash. GP §3.8.1. keccak256 : 𝔹 → ℍ. Bertoni et al. 2013, EYP. Deliberately left abstract — intended to be axiomatically specified or linked via FFI to a concrete cryptographic implementation.