<s>
Quark	B-Algorithm
is	O
a	O
cryptographic	O
hash	B-Error_Name
function	I-Error_Name
(	O
family	O
)	O
.	O
</s>
<s>
Quark	B-Algorithm
was	O
created	O
because	O
of	O
the	O
expressed	O
need	O
by	O
application	O
designers	O
(	O
notably	O
for	O
implementing	O
RFID	B-Application
protocols	O
)	O
for	O
a	O
lightweight	O
cryptographic	O
hash	B-Error_Name
function	I-Error_Name
.	O
</s>
<s>
The	O
SHA-3	B-Algorithm
NIST	B-Algorithm
hash	I-Algorithm
function	I-Algorithm
competition	I-Algorithm
concerned	O
general-purpose	O
designs	O
and	O
focused	O
on	O
software	O
performance	O
.	O
</s>
<s>
Quark	B-Algorithm
is	O
a	O
lightweight	O
hash	B-Error_Name
function	I-Error_Name
,	O
based	O
on	O
a	O
single	O
security	O
level	O
and	O
on	O
the	O
sponge	B-Algorithm
construction	I-Algorithm
,	O
to	O
minimize	O
memory	O
requirements	O
.	O
</s>
<s>
Inspired	O
by	O
the	O
lightweight	O
ciphers	O
Grain	B-Algorithm
and	O
KATAN	O
,	O
the	O
hash	B-Error_Name
function	I-Error_Name
family	O
Quark	B-Algorithm
is	O
composed	O
of	O
the	O
three	O
instances	O
u-Quark	O
,	O
d-Quark	O
,	O
and	O
t-Quark	O
.	O
</s>
<s>
Hardware	O
benchmarks	O
show	O
that	O
Quark	B-Algorithm
compares	O
well	O
to	O
previous	O
lightweight	O
hashes	B-Error_Name
.	O
</s>
<s>
For	O
example	O
,	O
the	O
u-Quark	O
conjecturally	O
instance	O
provides	O
at	O
least	O
64-bit	O
security	O
against	O
all	O
attacks	O
(	O
collisions	B-Algorithm
,	O
multicollisions	O
,	O
distinguishers	O
,	O
etc	O
.	O
</s>
