Semantic Scholar uses AI to extract papers important to this topic.
—We investigated ectoparasite loads between two syntopic species of whiptail lizards (Teiidae) which differ in reproductive modes… Expand The purpose of this study was, from a structural perspective, with emphasis on democratic values such as openness, reciprocity… Expand Prey preferences of large carnivores (tiger (Panthera tigris), leopard (Panthera pardus) and dhole (Cuon alpinus)) in the… Expand This paper evaluates the preimage resistance of the Tiger hash function. We will propose a pseudo-preimage attack on its… Expand Tiger is a cryptographic hash function proposed by Anderson and Biham in 1996. and produces a 192-bit hash value. Recently… Expand Tiger is a cryptographic hash function with a 192-bit hash value. It was proposed by Anderson and Biham in 1996. Recently… Expand With the increasing prominence of the Internet as a tool of commerce, security has become a tremendously important issue. One… Expand Tiger is a cryptographic hash function with a 192-bit hash value which was proposed by Anderson and Biham in 1996. At FSE 2006… Expand We describe a collision-finding attack on 16 rounds of the Tiger hash function requiring the time for about 244 compression… Expand Aquaculture has become important for the economy ofThailand, especially the culture of the tiger shrimp(Penaeus monodon). In… Expand