It assumes λ as an implementation-defined parameter detailing the number of bytes that can be processed to calculate a hash. The number of slices z the application is split into is therefore calculated depending on λ, see Eq. (1). z is rounded up to the next integer for two reasons. ...