• Why3

  • Referenced in 134 articles [sw04438]
  • basic programming data structures (arrays, queues, hash tables, etc.). A user can write WhyML programs...
  • Keccak

  • Referenced in 80 articles [sw09834]
  • generalization of the concept of cryptographic hash function with infinite output and can perform quasi ... symmetric cryptographic functions, from hashing to pseudo-random number generation to authenticated encryption...
  • SPADE

  • Referenced in 89 articles [sw02226]
  • make repeated database scans, and use complex hash structures which have poor locality. SPADE utilizes...
  • HAVAL

  • Referenced in 45 articles [sw02156]
  • HAVAL is a cryptographic hash function. Unlike MD5, but like most modern cryptographic hash functions ... HAVAL can produce hashes of different lengths. HAVAL can produce hashes in lengths ... used to generate the hash...
  • LED

  • Referenced in 53 articles [sw18983]
  • lightweight block cipher LED and the lightweight hash function PHOTON on the Xilinx FPGA series ... FPGA implementation (as of today) of any hash function...
  • Whirlpool

  • Referenced in 43 articles [sw13339]
  • WHIRLPOOL is a hash function designed by Vincent Rijmen and Paulo S. L. M. Barreto ... diffusion matrix employed in the Whirlpool hashing function,” NESSIE public report, 2003) was fixed afterwards...
  • Skein Hash

  • Referenced in 34 articles [sw20478]
  • Skein Hash Function Family. Skein is a new family of cryptographic hash functions. Its design...
  • SWIFFT

  • Referenced in 48 articles [sw11588]
  • SWIFFT: A modest proposal for FFT hashing. We propose SWIFFT, a collection of compression functions...
  • ProVerif

  • Referenced in 43 articles [sw06558]
  • public-key cryptography (encryption and signatures), hash functions, and Diffie-Hellman key agreements, specified both...
  • Quark

  • Referenced in 22 articles [sw08447]
  • Quark: a lightweight hash. The need for lightweight (that is, compact, low-power, low-energy ... cryptographic hash functions has been repeatedly expressed by professionals, notably to implement cryptographic protocols ... proposes a novel design philosophy for lightweight hash functions, based on the sponge construction ... lightest secure ciphers), we present the hash function family Quark, composed of three instances...
  • spongent

  • Referenced in 21 articles [sw08445]
  • spongent: A Lightweight Hash Function. This paper proposes spongent – a family of lightweight hash functions ... with hash sizes of 88 (for preimage resistance only), 128, 160, 224, and 256 bits ... security levels attained, it is the hash function with the smallest footprint in hardware published...
  • Ynot

  • Referenced in 35 articles [sw12334]
  • simple (e.g., association lists) to complex (e.g., hash tables) but share a common interface which...
  • UbiCrawler

  • Referenced in 33 articles [sw13197]
  • very effective assignment function (based on consistent hashing) for partitioning the domain to crawl...
  • EasyCrypt

  • Referenced in 32 articles [sw09738]
  • security proofs of the Cramer-Shoup and Hashed ElGamal cryptosystems...
  • MMH

  • Referenced in 16 articles [sw24968]
  • describe a construction of almost universal hash functions suitable for very fast software implementation ... applicable to the hashing of variable size data and fast cryptographic message authentication. Our construction ... Pentium-Pro, which achieve hashing speeds of 350 to 820 Mbit/sec, depending on the desired ... over current software implementations of universal hashing and other message authentication techniques (e.g., MD5-based...
  • Midori

  • Referenced in 27 articles [sw17436]
  • discipline with a number of ciphers and hash functions proposed. The designers’ focus has been...
  • HOT

  • Referenced in 26 articles [sw10803]
  • describe our implementation of the parallel hashed oct-tree code, and in particular its application...
  • Murphi

  • Referenced in 16 articles [sw22149]
  • this mode are saved in a hash table. States generated that exist in the hash...
  • LTSmin

  • Referenced in 21 articles [sw07214]
  • reachability (including multi-core compression and incremental hashing). The synergy effects in the LTSmin implementation...
  • B-Prolog

  • Referenced in 18 articles [sw06949]
  • handling, finite-domain constraint solving, arrays and hash tables, declarative loops, and tabling. Read more...