When Argon2, Balloon, scrypt, bcrypt¹, PBKDF2… are used for a password, we can call them password hash (for password storage) or password-based key derivation function (for use in encryption).
But that might not be understood when the context involves no passwords. Purposely-slowed hash is more descriptive, but awkward, and I have seldom seen it.
Are there established alternatives? If not, what do you propose?
Addition: I wish the term would be usable for strengthening the $b$-bit hash of a $3b$-bit Schnorr signature against brute force preimage attack. In this usage, there's nothing secret involved.
¹ As rightly pointed in comment, bcrypt can only produce 192 bits of output, which makes is passable for password hashing or short keys, but not a general Key Derivation Function.
OrpheanBeholderScryDoubt
. That text is 24-chacacters (192-bits) long, so that's what you get: 192-bits. The others are "key-derivation" functions that get repurposed as a password-hashing algorithm. – Ian Boyd Jun 01 '20 at 13:20