The Poseidon Hash

Used for the different purposes

Poseidon specification

This page provides just a simple description of the Poseidon hash function. For additional details please refer to the original publication. It contains exhaustive materials, security investigations, implementation details, proof system applications and so on.

Last updated