Skip to search formSkip to main contentSkip to account menu

Tiger (cryptography)

Known as: Tiger hash, Tiger hash function, Tiger (disambiguation) 
In cryptography, Tiger is a cryptographic hash function designed by Ross Anderson and Eli Biham in 1995 for efficiency on 64-bit platforms. The size… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Cloud computing is a standard architecture for providing computing services among servers and cloud user (CU) for preserving data… 
2014
2014
Bloom is an efficient data structure technique. Initially it was used in intelligent dictionaries and spell check applications… 
2013
2013
The purpose of this study was, from a structural perspective, with emphasis on democratic values such as openness, reciprocity… 
2013
2013
Cryptographic hash functions are an important building block used in many cryptosystems. The flexibility and ability of a system… 
2013
2013
....................................................................................................................... 2 Method… 
2012
2012
Tiger is an important type of an hash function producing 192-bit hash value from 512-bit message block and is proved to be secure… 
2011
2011
This paper evaluates the preimage resistance of the Tiger hash function. To our best knowledge, the maximum number of the… 
2007
2007
With the increasing prominence of the Internet as a tool of commerce, security has become a tremendously important issue. One… 
2006
2006
New hash function algorithms have a potential application compared to the conventional MD family hash functions. The architecture…