• Keccak

  • Referenced in 86 articles [sw09834]
  • generalization of the concept of cryptographic hash function with infinite output and can perform quasi ... symmetric cryptographic functions, from hashing to pseudo-random number generation to authenticated encryption ... iteration of a simple round function, similar to a block cipher without a key schedule...
  • LED

  • Referenced in 53 articles [sw18983]
  • block cipher LED and the lightweight hash function PHOTON on the Xilinx FPGA series Spartan ... implementation (as of today) of any hash function...
  • HAVAL

  • Referenced in 46 articles [sw02156]
  • HAVAL is a cryptographic hash function. Unlike MD5, but like most modern cryptographic hash functions...
  • Whirlpool

  • Referenced in 46 articles [sw13339]
  • WHIRLPOOL is a hash function designed by Vincent Rijmen and Paulo S. L. M. Barreto ... diffusion matrix employed in the Whirlpool hashing function,” NESSIE public report, 2003) was fixed afterwards...
  • Skein Hash

  • Referenced in 34 articles [sw20478]
  • Skein Hash Function Family. Skein is a new family of cryptographic hash functions. Its design...
  • ProVerif

  • Referenced in 45 articles [sw06558]
  • public-key cryptography (encryption and signatures), hash functions, and Diffie-Hellman key agreements, specified both...
  • Quark

  • Referenced in 22 articles [sw08447]
  • compact, low-power, low-energy) cryptographic hash functions has been repeatedly expressed by professionals, notably ... novel design philosophy for lightweight hash functions, based on the sponge construction in order ... lightest secure ciphers), we present the hash function family Quark, composed of three instances ... compares well to previous tentative lightweight hash functions. For example, our lightest instance u-Quark...
  • spongent

  • Referenced in 22 articles [sw08445]
  • spongent: A Lightweight Hash Function. This paper proposes spongent – a family of lightweight hash functions ... security levels attained, it is the hash function with the smallest footprint in hardware published...
  • Midori

  • Referenced in 35 articles [sw17436]
  • with a number of ciphers and hash functions proposed. The designers’ focus has been predominantly...
  • MMH

  • Referenced in 16 articles [sw24968]
  • describe a construction of almost universal hash functions suitable for very fast software implementation ... Carter and Wegman for universal hashing using modular multilinear functions that we carefully modify ... mathematical properties required for its use in hashing and message authentication...
  • libiop

  • Referenced in 16 articles [sw31793]
  • lightweight symmetric cryptography (any cryptographic hash function). The library provides a tool chain for transforming...
  • Tiger

  • Referenced in 8 articles [sw22039]
  • Tiger: a fast new hash function. Among those cryptographic hash function which are not based ... quite attractive for applications requiring fast software hashing. However collisions for Snefru were found ... This casts doubt on how long these functions’ variants, such as RIPE ... Alpha. We therefore present a new hash function which we believe to be secure...
  • CubeHash

  • Referenced in 13 articles [sw07100]
  • round-reduced variants of the hash function CubeHash, one of the SHA-3 second round...
  • UbiCrawler

  • Referenced in 34 articles [sw13197]
  • faults, a very effective assignment function (based on consistent hashing) for partitioning the domain...
  • Streebog

  • Referenced in 12 articles [sw40311]
  • standardization agency has recently published a hash function called Streebog and a 128-bit block...
  • MCBC

  • Referenced in 7 articles [sw03323]
  • finite field multiplication based universal hash function, the former needs one less ... MCBC does not need any universal hash function and it needs only one blockcipher ... online ciphers where two independent keys (hash function and blockcipher) are required...
  • BLAKE

  • Referenced in 8 articles [sw11099]
  • hash function BLAKE. This is a comprehensive description of the cryptographic hash function BLAKE ... authors offer a short introduction to cryptographic hashing, the SHA3 competition, and BLAKE. They review...
  • SWIFFT

  • Referenced in 48 articles [sw11588]
  • proposal for FFT hashing. We propose SWIFFT, a collection of compression functions that are highly...
  • SipHash

  • Referenced in 10 articles [sw09726]
  • pseudorandom functions optimized for short inputs. Target applications include network traffic authentication and hash-table ... tables switch to SipHash as a hash function...
  • ARXtools

  • Referenced in 10 articles [sw09727]
  • applied to reduced versions of the hash function Skein. We present several characteristics...