> Another approach has been to design hashes targeting a middle ground; these would have some security requirements but maintain the speed and efficiency of a non-cryptographic hash—for example, SipHash.
Sadly this hash function was not included in the test. While slower than the 4 tested ones, it's still an order of magnitude faster than the cryptographically secure ones and makes a hash table attacker's life much harder.
> Another approach has been to design hashes targeting a middle ground; these would have some security requirements but maintain the speed and efficiency of a non-cryptographic hash—for example, SipHash.
Sadly this hash function was not included in the test. While slower than the 4 tested ones, it's still an order of magnitude faster than the cryptographically secure ones and makes a hash table attacker's life much harder.