There are already hashes that do this essentially, with the possible exception, perhaps, of the RSA algorithm in particular. They are called cryptographic hashes, and their main point is that they are cryptographically secure, which means that they also include the same considerations as for security and security that go into public key cryptographic functions.
The only difference is that they were designed from scratch as hashes, so they also meet the individual requirements of the hash functions, which can be considered as additional strengths that cryptographic functions do not need.
In addition, there are factors that completely contradict each other, for example, you want the hash functions to be as fast as possible, without compromising security, while slowness is often considered as a function of cryptographic functions, since it limits the brute force of attacks significantly.
SHA-512 is a great cryptographic hash and probably deserves your attention. Whirlpool, Tiger and RipeMD are also great choices. You will not go wrong with any of them.
One more thing: if you really want it to be slow, then you definitely DO NOT want a hash function, and this happens completely wrong. If, as I assume, what you want is a very, very safe hash function, then, as I said, there are many options that are better suited to your example, although they are the same or even more cryptographically secure.
By the way, I'm not quite sure that there is no weakness with your mixing algorithm. Although the output of each RSA block is designed to be homogeneous with a high level of avalanche, etc. Etc. Etc., I am still concerned that this could create a problem for the selected plaintext or comparative analysis of similar messages.