Katholieke Universiteit Leuven
The first designs of cryptographic hash functions date back to the late 1970s; more proposals emerged in the 1980s. During the 1990s, the number of hash function designs grew very quickly, but for many of these proposals security flaws were identified. MD5 and SHA-1 were deployed in an ever increasing number of applications, resulting in the name \"Swiss army knives\" of cryptography. In spite of the importance of hash functions, only limited effort was spent on studying their formal definitions and foundations.