Abstract: The everchanging security environment demands new, robust and customizable hash functions that integrate novel techniques to improve performance. This paper evaluates the performance of a ...