• Keccak

  • Referenced in 80 articles [sw09834]
  • generalization of the concept of cryptographic hash function with infinite output and can perform quasi ... symmetric cryptographic functions, from hashing to pseudo-random number generation to authenticated encryption...
  • HAVAL

  • Referenced in 45 articles [sw02156]
  • HAVAL is a cryptographic hash function. Unlike MD5, but like most modern cryptographic hash functions...
  • Skein Hash

  • Referenced in 34 articles [sw20478]
  • Skein is a new family of cryptographic hash functions. Its design combines speed, security, simplicity...
  • Quark

  • Referenced in 22 articles [sw08447]
  • compact, low-power, low-energy) cryptographic hash functions has been repeatedly expressed by professionals, notably ... implement cryptographic protocols in RFID technology. At the time of writing, however, no algorithm exists ... novel design philosophy for lightweight hash functions, based on the sponge construction in order...
  • Tiger

  • Referenced in 8 articles [sw22039]
  • fast new hash function. Among those cryptographic hash function which are not based on block...
  • BLAKE

  • Referenced in 8 articles [sw11099]
  • comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders ... authors offer a short introduction to cryptographic hashing, the SHA3 competition, and BLAKE. They review...
  • libiop

  • Referenced in 9 articles [sw31793]
  • only on lightweight symmetric cryptography (any cryptographic hash function). The library provides a tool chain...
  • ProVerif

  • Referenced in 43 articles [sw06558]
  • different cryptographic primitives, including shared- and public-key cryptography (encryption and signatures), hash functions...
  • Whirlpool

  • Referenced in 43 articles [sw13339]
  • WHIRLPOOL is a hash function designed by Vincent Rijmen and Paulo S. L. M. Barreto ... selected for the NESSIE portfolio of cryptographic primitives. A flaw in its diffusion layer reported ... diffusion matrix employed in the Whirlpool hashing function,” NESSIE public report, 2003) was fixed afterwards...
  • Whirlwind

  • Referenced in 4 articles [sw06748]
  • cryptographic hash function, Whirlwind, is presented. We give a full specification and explain the design...
  • LED

  • Referenced in 53 articles [sw18983]
  • PHOTON are new ultra-lightweight cryptographic algorithms aiming at resource-constrained devices. In this article ... block cipher LED and the lightweight hash function PHOTON on the Xilinx FPGA series Spartan...
  • MurmurHash

  • Referenced in 2 articles [sw34777]
  • MurmurHash is a non-cryptographic hash function suitable for general hash-based lookup ... used in its inner loop. Unlike cryptographic hash functions, it is not specifically designed ... adversary, making it unsuitable for cryptographic purposes. (wikipedia...
  • MMH

  • Referenced in 16 articles [sw24968]
  • hash functions suitable for very fast software implementation and applicable to the hashing of variable ... size data and fast cryptographic message authentication. Our construction uses fast single precision arithmetic which ... growing performance needs of cryptographic (and other universal hashing) applications. par The construction is based ... Carter and Wegman for universal hashing using modular multilinear functions that we carefully modify...
  • SMHasher

  • Referenced in 1 article [sw34776]
  • collision, and performance properties of non-cryptographic hash functions. This is the home ... MurmurHash family of hash functions along with the SMHasher test suite used to verify them ... collision, and performance properties of non-cryptographic hash functions - it aims to be the DieHarder...
  • Rig

  • Referenced in 1 article [sw13609]
  • which is based on secure cryptographic hash functions. It provides the flexibility to choose different...
  • Apte

  • Referenced in 6 articles [sw20604]
  • handle several cryptographic primitives: symmetric and asymmetric encryption / decryption, digital signature, hash functions, pairing...
  • pyblake2

  • Referenced in 0 articles [sw33177]
  • function for Python. BLAKE2 is a cryptographic hash function, which offers highest security while being...
  • SCAPI

  • Referenced in 3 articles [sw22635]
  • blocks for cryptographic constructions (e.g., pseudorandom functions, pseudorandom generators, discrete logarithm groups, hash functions...
  • SUPERCOP

  • Referenced in 2 articles [sw10474]
  • benchmarking framework for cryptographic algorithms like ciphers and hash functions. It automatically benchmarks algorithms across ... Smart Cards are important target platforms for cryptographic algorithms. The work presented in this paper...
  • digest

  • Referenced in 5 articles [sw16125]
  • objects, as well as a function ’hmac()’ to create hash-based message authentication code. Please ... meant to be deployed for cryptographic purposes for which more comprehensive (and widely tested) libraries...