Skip to search formSkip to main contentSkip to account menu

Tiger (cryptography)

Known as: Tiger hash, Tiger hash function, Tiger (disambiguation) 
In cryptography, Tiger is a cryptographic hash function designed by Ross Anderson and Eli Biham in 1995 for efficiency on 64-bit platforms. The size… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
—We investigated ectoparasite loads between two syntopic species of whiptail lizards (Teiidae) which differ in reproductive modes… 
2015
2015
An illustrated checklist of 36 species of dung beetles (Coleoptera: Scarabaeinae) from the Periyar Tiger Reserve in the southern… 
2014
2014
Bloom is an efficient data structure technique. Initially it was used in intelligent dictionaries and spell check applications… 
2010
2010
Prey preferences of large carnivores (tiger (Panthera tigris), leopard (Panthera pardus) and dhole (Cuon alpinus)) in the… 
2010
2010
This paper evaluates the preimage resistance of the Tiger hash function. We will propose a pseudo-preimage attack on its… 
2007
2007
Tiger is a cryptographic hash function with a 192-bit hash value. It was proposed by Anderson and Biham in 1996. Recently… 
2007
2007
With the increasing prominence of the Internet as a tool of commerce, security has become a tremendously important issue. One… 
2006
2006
Tiger is a cryptographic hash function with a 192-bit hash value which was proposed by Anderson and Biham in 1996. At FSE 2006… 
2006
2006
We describe a collision-finding attack on 16 rounds of the Tiger hash function requiring the time for about 244 compression… 
2004
2004
Aquaculture has become important for the economy ofThailand, especially the culture of the tiger shrimp(Penaeus monodon). In…