Return to Article Details An example of a cryptographic hash function based on a modified sponge scheme Download Download PDF