Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,286 papers from all fields of science
Search
Sign In
Create Free Account
Tiger (cryptography)
Known as:
Tiger hash
, Tiger hash function
, Tiger (disambiguation)
Expand
In cryptography, Tiger is a cryptographic hash function designed by Ross Anderson and Eli Biham in 1995 for efficiency on 64-bit platforms. The size…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
21 relations
Comparison of cryptographic hash functions
Comparison of cryptography libraries
Comparison of operating system kernels
Crypto++
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
TIGER HASH KERBEROS BIOMETRIC BLOWFISH USER AUTHENTICATION FOR SECURED DATA ACCESS IN CLOUD
K. Prabha
,
Dr. P. Vidhya Saraswathi
2nd International Conference on I-SMAC (IoT in…
2018
Corpus ID: 67875416
Cloud computing is a standard architecture for providing computing services among servers and cloud user (CU) for preserving data…
Expand
2014
2014
Investigation on bloom filter and implementation of 3k combined parallel tiger bloom filter design
K. Saravanan
,
A. Senthilkumar
International Conference on Electronics, Circuits…
2014
Corpus ID: 41714724
Bloom is an efficient data structure technique. Initially it was used in intelligent dictionaries and spell check applications…
Expand
2014
2014
A Study on the Formativeness for Modern Reinterpretation of the Folk Painting - Focused on Magpie & Tiger -
Kim Seong Chan
,
나성숙
2014
Corpus ID: 195014742
2013
2013
En svensk tiger? - en kvalitativ studie om yttrandefrihet inom svensk förvaltning
Christine Langner
,
Carina Martinsson
2013
Corpus ID: 142506278
The purpose of this study was, from a structural perspective, with emphasis on democratic values such as openness, reciprocity…
Expand
2013
2013
Towards algorithm agility for wireless sensor networks: Comparison of the portability of selected Hash functions
Manuel Koschuch
,
Matthias Hudler
,
Zsolt Saffer
International Conference on Data Communication…
2013
Corpus ID: 18381074
Cryptographic hash functions are an important building block used in many cryptosystems. The flexibility and ability of a system…
Expand
2013
2013
Examining the Effects of Increasing Schedule Requirements on Prefe rence in an Applied Setting A Thesis Presented by
Ashley A. Ahlers
,
Daniel M. Fienup
2013
Corpus ID: 55334486
....................................................................................................................... 2 Method…
Expand
2012
2012
On the Security of the Encryption Mode of Tiger
Onur Özen
2012
Corpus ID: 6050157
Tiger is an important type of an hash function producing 192-bit hash value from 512-bit message block and is proved to be secure…
Expand
2011
2011
Preimage Attack on 23-Step Tiger
Lei Wang
,
Yu Sasaki
IEICE Transactions on Fundamentals of Electronics…
2011
Corpus ID: 31104957
This paper evaluates the preimage resistance of the Tiger hash function. To our best knowledge, the maximum number of the…
Expand
2007
2007
A Prototype for Tiger Hash Primitive Hardware Architecture
Sudarshan TSB
,
K. Rakesh
,
S. Kumar K
15th International Conference on Advanced…
2007
Corpus ID: 14169651
With the increasing prominence of the Internet as a tool of commerce, security has become a tremendously important issue. One…
Expand
2006
2006
FPGA Implementation of Tiger Hash Function
Guoping Wang
IEEE International Conference on Electro…
2006
Corpus ID: 1922919
New hash function algorithms have a potential application compared to the conventional MD family hash functions. The architecture…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE