
PARSHA
 Referenced in 5 articles
[sw02762]
 PARSHA256  a new parallelizable hash function and a multithreaded implementation. In this paper ... design a new hash function PARSHA256. PARSHA256 uses the compression function...

PHOTON
 Referenced in 5 articles
[sw13048]
 block cipher LED and the lightweight hash function PHOTON on the Xilinx FPGA series Spartan ... implementation (as of today) of any hash function...

CryptoSMT
 Referenced in 4 articles
[sw26676]
 symmetric primitives likes block ciphers or hash functions. CryptoSMT is an easy to use tool ... symmetric primitives likes block ciphers or hash functions. It is based on SMT/SAT solvers like ... differential. Find preimages for hash functions. Recover a secret key. The following primitives are supported...

Apte
 Referenced in 6 articles
[sw20604]
 asymmetric encryption / decryption, digital signature, hash functions, pairing and any oneway function...

EPCBC
 Referenced in 6 articles
[sw11640]
 block cipher is used as a hash function. In the course of proving the security...

Whirlwind
 Referenced in 4 articles
[sw06748]
 cryptographic hash function, Whirlwind, is presented. We give a full specification and explain the design ... rationale. We show how the hash function can be implemented efficiently in software and give...

Saturnin
 Referenced in 4 articles
[sw41873]
 security level: through a weaker round function or a smaller number of rounds, the security ... usage in different modes to provide hashing and authenticated encryption in such a way that ... built two authenticated ciphers and a hash function. • SaturninCTRCascade is an authenticated cipher ... SaturninHash is a 256bit hash function. In this document, we specify this suite...

General Purpose Hash Function Library
 Referenced in 3 articles
[sw05609]
 General Purpose Hash Function Algorithm library contains implementations for a series of commonly used additive ... rotative string hashing algorithms in the C++ programming language...

XKCP
 Referenced in 4 articles
[sw36433]
 extendableoutput functions and SHA3 hash functions from FIPS 202, the cSHAKE, KMAC, ParallelHash...

QARMA
 Referenced in 4 articles
[sw41022]
 exploitation, and the construction of keyed hash functions...

HACL*
 Referenced in 4 articles
[sw36852]
 authentication, SHA256 and SHA512 hash functions, the Curve25519 elliptic curve, and Ed25519 signatures...

SCAPI
 Referenced in 3 articles
[sw22635]
 functions, pseudorandom generators, discrete logarithm groups, hash functions and more belong to this layer...

MurmurHash
 Referenced in 2 articles
[sw34777]
 MurmurHash is a noncryptographic hash function suitable for general hashbased lookup ... inner loop. Unlike cryptographic hash functions, it is not specifically designed to be difficult...

LibTom
 Referenced in 3 articles
[sw29716]
 known published block ciphers, oneway hash functions, chaining modes, pseudorandom number generators, public...

POEx
 Referenced in 3 articles
[sw22877]
 call to a 2nbit universal hash function per message block. POEx builds upon...

SparseCount2
 Referenced in 1 article
[sw41091]
 standard construction of strongly 2universal hash functions employs dense XORs (i.e., involving half ... design of sparse XORs as hash functions. Such constructions have been proposed with beliefs ... applicability of analysis for sparse hash functions to all the hashingbased techniques, we prove ... performance benefits of sparse hash functions. To this end, we first design, to the best...

ApproxMC3
 Referenced in 1 article
[sw41092]
 standard construction of strongly 2universal hash functions employs dense XORs (i.e., involving half ... design of sparse XORs as hash functions. Such constructions have been proposed with beliefs ... applicability of analysis for sparse hash functions to all the hashingbased techniques, we prove ... performance benefits of sparse hash functions. To this end, we first design, to the best...

SAMOSA
 Referenced in 1 article
[sw09725]
 mode of operation FP and the hash function SAMOSA. The contribution of the paper ... show that any nbit hash function that uses the FP mode is indifferentiable from ... into perspective, we propose a concrete hash function SAMOSA using the new mode ... seems possible to design a hash function based on the FP mode that can achieve...

digest
 Referenced in 5 articles
[sw16125]
 digest. Implementation of a function ’digest()’ for the creation of hash digests of arbitrary ... objects, as well as a function ’hmac()’ to create hashbased message authentication code. Please...

SMHasher
 Referenced in 1 article
[sw34776]
 performance properties of noncryptographic hash functions. This is the home for the MurmurHash family ... hash functions along with the SMHasher test suite used to verify them. SMHasher is released ... performance properties of noncryptographic hash functions  it aims to be the DieHarder of hash ... finding flaws with a number of popular hashes. The SMHasher suite also includes MurmurHash3, which...