• PARSHA

  • Referenced in 5 articles [sw02762]
  • PARSHA-256 -- a new parallelizable hash function and a multithreaded implementation. In this paper ... design a new hash function PARSHA-256. PARSHA-256 uses the compression function...
  • PHOTON

  • Referenced in 5 articles [sw13048]
  • block cipher LED and the lightweight hash function PHOTON on the Xilinx FPGA series Spartan ... implementation (as of today) of any hash function...
  • CryptoSMT

  • Referenced in 4 articles [sw26676]
  • symmetric primitives likes block ciphers or hash functions. CryptoSMT is an easy to use tool ... symmetric primitives likes block ciphers or hash functions. It is based on SMT/SAT solvers like ... differential. Find preimages for hash functions. Recover a secret key. The following primitives are supported...
  • Apte

  • Referenced in 6 articles [sw20604]
  • asymmetric encryption / decryption, digital signature, hash functions, pairing and any one-way function...
  • EPCBC

  • Referenced in 6 articles [sw11640]
  • block cipher is used as a hash function. In the course of proving the security...
  • Whirlwind

  • Referenced in 4 articles [sw06748]
  • cryptographic hash function, Whirlwind, is presented. We give a full specification and explain the design ... rationale. We show how the hash function can be implemented efficiently in software and give...
  • Saturnin

  • Referenced in 4 articles [sw41873]
  • security level: through a weaker round function or a smaller number of rounds, the security ... usage in different modes to provide hashing and authenticated encryption in such a way that ... built two authenticated ciphers and a hash function. • Saturnin-CTR-Cascade is an authenticated cipher ... Saturnin-Hash is a 256-bit hash function. In this document, we specify this suite...
  • General Purpose Hash Function Library

  • Referenced in 3 articles [sw05609]
  • General Purpose Hash Function Algorithm library contains implementations for a series of commonly used additive ... rotative string hashing algorithms in the C++ programming language...
  • XKCP

  • Referenced in 4 articles [sw36433]
  • extendable-output functions and SHA-3 hash functions from FIPS 202, the cSHAKE, KMAC, ParallelHash...
  • QARMA

  • Referenced in 4 articles [sw41022]
  • exploitation, and the construction of keyed hash functions...
  • HACL*

  • Referenced in 4 articles [sw36852]
  • authentication, SHA-256 and SHA-512 hash functions, the Curve25519 elliptic curve, and Ed25519 signatures...
  • SCAPI

  • Referenced in 3 articles [sw22635]
  • functions, pseudorandom generators, discrete logarithm groups, hash functions and more belong to this layer...
  • MurmurHash

  • Referenced in 2 articles [sw34777]
  • MurmurHash is a non-cryptographic hash function suitable for general hash-based lookup ... inner loop. Unlike cryptographic hash functions, it is not specifically designed to be difficult...
  • LibTom

  • Referenced in 3 articles [sw29716]
  • known published block ciphers, one-way hash functions, chaining modes, pseudo-random number generators, public...
  • POEx

  • Referenced in 3 articles [sw22877]
  • call to a 2n-bit universal hash function per message block. POEx builds upon...
  • SparseCount2

  • Referenced in 1 article [sw41091]
  • standard construction of strongly 2-universal hash functions employs dense XORs (i.e., involving half ... design of sparse XORs as hash functions. Such constructions have been proposed with beliefs ... applicability of analysis for sparse hash functions to all the hashing-based techniques, we prove ... performance benefits of sparse hash functions. To this end, we first design, to the best...
  • ApproxMC3

  • Referenced in 1 article [sw41092]
  • standard construction of strongly 2-universal hash functions employs dense XORs (i.e., involving half ... design of sparse XORs as hash functions. Such constructions have been proposed with beliefs ... applicability of analysis for sparse hash functions to all the hashing-based techniques, we prove ... performance benefits of sparse hash functions. To this end, we first design, to the best...
  • SAMOSA

  • Referenced in 1 article [sw09725]
  • mode of operation FP and the hash function SAMOSA. The contribution of the paper ... show that any n-bit hash function that uses the FP mode is indifferentiable from ... into perspective, we propose a concrete hash function SAMOSA using the new mode ... seems possible to design a hash function based on the FP mode that can achieve...
  • digest

  • Referenced in 5 articles [sw16125]
  • digest. Implementation of a function ’digest()’ for the creation of hash digests of arbitrary ... objects, as well as a function ’hmac()’ to create hash-based message authentication code. Please...
  • SMHasher

  • Referenced in 1 article [sw34776]
  • performance properties of non-cryptographic hash functions. This is the home for the MurmurHash family ... hash functions along with the SMHasher test suite used to verify them. SMHasher is released ... performance properties of non-cryptographic hash functions - it aims to be the DieHarder of hash ... finding flaws with a number of popular hashes. The SMHasher suite also includes MurmurHash3, which...