
Why3
 Referenced in 134 articles
[sw04438]
 basic programming data structures (arrays, queues, hash tables, etc.). A user can write WhyML programs...

Keccak
 Referenced in 80 articles
[sw09834]
 generalization of the concept of cryptographic hash function with infinite output and can perform quasi ... symmetric cryptographic functions, from hashing to pseudorandom number generation to authenticated encryption...

SPADE
 Referenced in 89 articles
[sw02226]
 make repeated database scans, and use complex hash structures which have poor locality. SPADE utilizes...

HAVAL
 Referenced in 45 articles
[sw02156]
 HAVAL is a cryptographic hash function. Unlike MD5, but like most modern cryptographic hash functions ... HAVAL can produce hashes of different lengths. HAVAL can produce hashes in lengths ... used to generate the hash...

LED
 Referenced in 53 articles
[sw18983]
 lightweight block cipher LED and the lightweight hash function PHOTON on the Xilinx FPGA series ... FPGA implementation (as of today) of any hash function...

Whirlpool
 Referenced in 43 articles
[sw13339]
 WHIRLPOOL is a hash function designed by Vincent Rijmen and Paulo S. L. M. Barreto ... diffusion matrix employed in the Whirlpool hashing function,” NESSIE public report, 2003) was fixed afterwards...

Skein Hash
 Referenced in 34 articles
[sw20478]
 Skein Hash Function Family. Skein is a new family of cryptographic hash functions. Its design...

SWIFFT
 Referenced in 48 articles
[sw11588]
 SWIFFT: A modest proposal for FFT hashing. We propose SWIFFT, a collection of compression functions...

ProVerif
 Referenced in 43 articles
[sw06558]
 publickey cryptography (encryption and signatures), hash functions, and DiffieHellman key agreements, specified both...

Quark
 Referenced in 22 articles
[sw08447]
 Quark: a lightweight hash. The need for lightweight (that is, compact, lowpower, lowenergy ... cryptographic hash functions has been repeatedly expressed by professionals, notably to implement cryptographic protocols ... proposes a novel design philosophy for lightweight hash functions, based on the sponge construction ... lightest secure ciphers), we present the hash function family Quark, composed of three instances...

spongent
 Referenced in 21 articles
[sw08445]
 spongent: A Lightweight Hash Function. This paper proposes spongent – a family of lightweight hash functions ... with hash sizes of 88 (for preimage resistance only), 128, 160, 224, and 256 bits ... security levels attained, it is the hash function with the smallest footprint in hardware published...

Ynot
 Referenced in 35 articles
[sw12334]
 simple (e.g., association lists) to complex (e.g., hash tables) but share a common interface which...

UbiCrawler
 Referenced in 33 articles
[sw13197]
 very effective assignment function (based on consistent hashing) for partitioning the domain to crawl...

EasyCrypt
 Referenced in 32 articles
[sw09738]
 security proofs of the CramerShoup and Hashed ElGamal cryptosystems...

MMH
 Referenced in 16 articles
[sw24968]
 describe a construction of almost universal hash functions suitable for very fast software implementation ... applicable to the hashing of variable size data and fast cryptographic message authentication. Our construction ... PentiumPro, which achieve hashing speeds of 350 to 820 Mbit/sec, depending on the desired ... over current software implementations of universal hashing and other message authentication techniques (e.g., MD5based...

Midori
 Referenced in 27 articles
[sw17436]
 discipline with a number of ciphers and hash functions proposed. The designers’ focus has been...

HOT
 Referenced in 26 articles
[sw10803]
 describe our implementation of the parallel hashed octtree code, and in particular its application...

Murphi
 Referenced in 16 articles
[sw22149]
 this mode are saved in a hash table. States generated that exist in the hash...

LTSmin
 Referenced in 21 articles
[sw07214]
 reachability (including multicore compression and incremental hashing). The synergy effects in the LTSmin implementation...

BProlog
 Referenced in 18 articles
[sw06949]
 handling, finitedomain constraint solving, arrays and hash tables, declarative loops, and tabling. Read more...