• Keccak

  • Referenced in 65 articles [sw09834]
  • generalization of the concept of cryptographic hash function with infinite output and can perform quasi ... symmetric cryptographic functions, from hashing to pseudo-random number generation to authenticated encryption ... iteration of a simple round function, similar to a block cipher without a key schedule...
  • HAVAL

  • Referenced in 44 articles [sw02156]
  • HAVAL is a cryptographic hash function. Unlike MD5, but like most modern cryptographic hash functions...
  • LED

  • Referenced in 43 articles [sw18983]
  • block cipher LED and the lightweight hash function PHOTON on the Xilinx FPGA series Spartan ... implementation (as of today) of any hash function...
  • Whirlpool

  • Referenced in 41 articles [sw13339]
  • WHIRLPOOL is a hash function designed by Vincent Rijmen and Paulo S. L. M. Barreto ... diffusion matrix employed in the Whirlpool hashing function,” NESSIE public report, 2003) was fixed afterwards...
  • Skein Hash

  • Referenced in 31 articles [sw20478]
  • Skein Hash Function Family. Skein is a new family of cryptographic hash functions. Its design...
  • ProVerif

  • Referenced in 38 articles [sw06558]
  • public-key cryptography (encryption and signatures), hash functions, and Diffie-Hellman key agreements, specified both...
  • Quark

  • Referenced in 18 articles [sw08447]
  • compact, low-power, low-energy) cryptographic hash functions has been repeatedly expressed by professionals, notably ... novel design philosophy for lightweight hash functions, based on the sponge construction in order ... lightest secure ciphers), we present the hash function family Quark, composed of three instances ... compares well to previous tentative lightweight hash functions. For example, our lightest instance u-Quark...
  • spongent

  • Referenced in 16 articles [sw08445]
  • spongent: A Lightweight Hash Function. This paper proposes spongent – a family of lightweight hash functions ... security levels attained, it is the hash function with the smallest footprint in hardware published...
  • MMH

  • Referenced in 14 articles [sw24968]
  • describe a construction of almost universal hash functions suitable for very fast software implementation ... Carter and Wegman for universal hashing using modular multilinear functions that we carefully modify ... mathematical properties required for its use in hashing and message authentication...
  • Midori

  • Referenced in 14 articles [sw17436]
  • with a number of ciphers and hash functions proposed. The designers’ focus has been predominantly...
  • Tiger

  • Referenced in 8 articles [sw22039]
  • Tiger: a fast new hash function. Among those cryptographic hash function which are not based ... quite attractive for applications requiring fast software hashing. However collisions for Snefru were found ... This casts doubt on how long these functions’ variants, such as RIPE ... Alpha. We therefore present a new hash function which we believe to be secure...
  • CubeHash

  • Referenced in 12 articles [sw07100]
  • round-reduced variants of the hash function CubeHash, one of the SHA-3 second round...
  • UbiCrawler

  • Referenced in 30 articles [sw13197]
  • faults, a very effective assignment function (based on consistent hashing) for partitioning the domain...
  • BLAKE

  • Referenced in 7 articles [sw11099]
  • hash function BLAKE. This is a comprehensive description of the cryptographic hash function BLAKE ... authors offer a short introduction to cryptographic hashing, the SHA3 competition, and BLAKE. They review...
  • MCBC

  • Referenced in 6 articles [sw03323]
  • finite field multiplication based universal hash function, the former needs one less ... MCBC does not need any universal hash function and it needs only one blockcipher ... online ciphers where two independent keys (hash function and blockcipher) are required...
  • SWIFFT

  • Referenced in 44 articles [sw11588]
  • proposal for FFT hashing. We propose SWIFFT, a collection of compression functions that are highly...
  • ARXtools

  • Referenced in 9 articles [sw09727]
  • applied to reduced versions of the hash function Skein. We present several characteristics...
  • PARSHA

  • Referenced in 5 articles [sw02762]
  • PARSHA-256 -- a new parallelizable hash function and a multithreaded implementation. In this paper ... design a new hash function PARSHA-256. PARSHA-256 uses the compression function...
  • SipHash

  • Referenced in 6 articles [sw09726]
  • pseudorandom functions optimized for short inputs. Target applications include network traffic authentication and hash-table ... tables switch to SipHash as a hash function...
  • EPCBC

  • Referenced in 5 articles [sw11640]
  • block cipher is used as a hash function. In the course of proving the security...