Difference between revisions of "Tiger"
From The ECRYPT Hash Function Website
Line 1: | Line 1: | ||
− | + | == General == | |
+ | hmm | ||
+ | <!-- | ||
+ | * digest size: 160 bits | ||
+ | * max. message length: < 2<sup>64</sup> bits | ||
+ | * compression function: 512-bit message block, 160-bit chaining variable | ||
+ | * Specification: | ||
+ | --> | ||
+ | |||
+ | == Cryptanalysis == | ||
+ | |||
+ | |||
+ | === Best Known Results === | ||
+ | |||
+ | ---- | ||
+ | |||
+ | === Generic Attacks === | ||
+ | * [[GenericAttacksMerkleDamgaard| Generic Attacks on the Merkle-Damgaard Construction ]] | ||
+ | |||
+ | ---- | ||
+ | |||
+ | === Collision Attacks === | ||
+ | |||
+ | ---- | ||
+ | |||
+ | === Second Preimage Attacks === | ||
+ | |||
+ | ---- | ||
+ | |||
+ | === Preimage Attacks === | ||
+ | |||
+ | |||
+ | ---- | ||
+ | |||
+ | === Others === | ||
+ | |||
+ | |||
+ | == Performance Evaluation / Implementation (HW and SW) == |
Revision as of 15:10, 7 March 2008
Contents
1 General
hmm