Tiger
From The ECRYPT Hash Function Website
Revision as of 15:10, 7 March 2008 by
Tnad
(
talk
|
contribs
)
(
diff
)
← Older revision
|
Latest revision
(
diff
) |
Newer revision →
(
diff
)
Jump to:
navigation
,
search
Contents
1
General
2
Cryptanalysis
2.1
Best Known Results
2.2
Generic Attacks
2.3
Collision Attacks
2.4
Second Preimage Attacks
2.5
Preimage Attacks
2.6
Others
3
Performance Evaluation / Implementation (HW and SW)
1
General
2
Cryptanalysis
2.1
Best Known Results
2.2
Generic Attacks
Generic Attacks on the Merkle-Damgaard Construction
2.3
Collision Attacks
2.4
Second Preimage Attacks
2.5
Preimage Attacks
2.6
Others
3
Performance Evaluation / Implementation (HW and SW)
Navigation menu
Views
Page
Discussion
View source
History
Personal tools
Log in
Navigation
The eHash Main Page
Hash Function Zoo
SHA-3 Zoo
Recent changes
Random page
Help
Search
Tools
What links here
Related changes
Special pages
Permanent link
Page information