Tiger
From The ECRYPT Hash Function Website
Revision as of 16:18, 7 March 2008 by
Fmendel
(
talk
|
contribs
)
(
diff
)
← Older revision
|
Latest revision
(
diff
) |
Newer revision →
(
diff
)
Jump to:
navigation
,
search
Contents
1
Spezification
2
Cryptanalysis
2.1
Best Known Results
2.2
Generic Attacks
2.3
Collision Attacks
2.4
Second Preimage Attacks
2.5
Preimage Attacks
2.6
Others
1
Spezification
digest size: 192/160/128 bits
max. message length: < 2
64
bits
compression function: 512-bit message block, 192-bit chaining variable
Specification:
2
Cryptanalysis
2.1
Best Known Results
2.2
Generic Attacks
Generic Attacks on the Merkle-Damgaard Construction
2.3
Collision Attacks
2.4
Second Preimage Attacks
2.5
Preimage Attacks
2.6
Others
Navigation menu
Views
Page
Discussion
View source
History
Personal tools
Log in
Navigation
The eHash Main Page
Hash Function Zoo
SHA-3 Zoo
Recent changes
Random page
Help
Search
Tools
What links here
Related changes
Special pages
Permanent link
Page information