Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,237,278 papers from all fields of science
Search
Sign In
Create Free Account
Tiger (cryptography)
Known as:
Tiger hash
, Tiger hash function
, Tiger (disambiguation)
Expand
In cryptography, Tiger is a cryptographic hash function designed by Ross Anderson and Eli Biham in 1995 for efficiency on 64-bit platforms. The size…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
21 relations
Comparison of cryptographic hash functions
Comparison of cryptography libraries
Comparison of operating system kernels
Crypto++
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
A Centralized Data Validation Approach for Distributed Healthcare Systems in Dew-Fog Computing Environment Using Blockchain
Grace Simpson
,
Kester Quist-Aphetsi
International Conference on Cyber Security and…
2019
Corpus ID: 215737961
Patients healthcare data should be securely available and accessible to authorized users when needed to facilitate healthcare…
Expand
2014
2014
Investigation on bloom filter and implementation of 3k combined parallel tiger bloom filter design
K. Saravanan
,
A. Senthilkumar
International Conference on Electronics, Circuits…
2014
Corpus ID: 41714724
Bloom is an efficient data structure technique. Initially it was used in intelligent dictionaries and spell check applications…
Expand
2012
2012
On the Security of the Encryption Mode of Tiger
Onur Özen
2012
Corpus ID: 6050157
Tiger is an important type of an hash function producing 192-bit hash value from 512-bit message block and is proved to be secure…
Expand
2011
2011
Prey preference of large carnivores in Anamalai Tiger Reserve, India
A. Kumaraguru
,
R. Saravanamuthu
,
K. Brinda
,
S. Asokan
Zeitschrift f\ ur Jagdwissenschaft
2011
Corpus ID: 24522135
Prey preferences of large carnivores (tiger (Panthera tigris), leopard (Panthera pardus) and dhole (Cuon alpinus)) in the…
Expand
2010
2010
Finding Preimages of Tiger Up to 23 Steps
Lei Wang
,
Yu Sasaki
Fast Software Encryption Workshop
2010
Corpus ID: 26414391
This paper evaluates the preimage resistance of the Tiger hash function. We will propose a pseudo-preimage attack on its…
Expand
2007
2007
Cryptanalysis of the Tiger Hash Function
Florian Mendel
,
V. Rijmen
International Conference on the Theory and…
2007
Corpus ID: 3734982
Tiger is a cryptographic hash function with a 192-bit hash value. It was proposed by Anderson and Biham in 1996. Recently…
Expand
2007
2007
A Prototype for Tiger Hash Primitive Hardware Architecture
Sudarshan TSB
,
K. Rakesh
,
S. Kumar K
15th International Conference on Advanced…
2007
Corpus ID: 14169651
With the increasing prominence of the Internet as a tool of commerce, security has become a tremendously important issue. One…
Expand
2006
2006
Update on Tiger
Florian Mendel
,
B. Preneel
,
V. Rijmen
,
Hirotaka Yoshida
,
Dai Watanabe
International Conference on Cryptology in India
2006
Corpus ID: 3795452
Tiger is a cryptographic hash function with a 192-bit hash value which was proposed by Anderson and Biham in 1996. At FSE 2006…
Expand
2006
2006
Collisions and Near-Collisions for Reduced-Round Tiger
J. Kelsey
,
S. Lucks
Fast Software Encryption Workshop
2006
Corpus ID: 7361459
We describe a collision-finding attack on 16 rounds of the Tiger hash function requiring the time for about 244 compression…
Expand
1997
1997
Status of marine larviculture in Thailand
T. Pechmanee
Hydrobiologia
1997
Corpus ID: 10986056
Aquaculture has become important for the economy ofThailand, especially the culture of the tiger shrimp(Penaeus monodon). In…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE