-
Low-degree round functions (e.g., MiMC, Poseidon):
- Use simple operations in each round but require many rounds for security.
- Offer a good balance between security and efficiency within ZK circuits.
-
Low-degree equivalence (e.g., Rescue, Griffin):
- Achieve better efficiency within ZK circuits by proving an equivalent but lower-degree constraint.
- Slower for regular computations outside ZK circuits.
-
Lookup-based round functions (e.g., Monolith):
- Utilize lookup tables for faster computations within ZK circuits (if supported by the proof system).
- Offer close to regular hash function speeds for computations outside ZK circuits.
